Efficient Decentralized Attribute Based Access Control for Mobile Clouds

被引:53
作者
De, Sourya Joyee [1 ]
Ruj, Sushmita [2 ]
机构
[1] LORIA INRIA Nancy Grand Est, Villers Les Nancy, France
[2] Indian Stat Inst, Comp & Commun Sci Div, 203 BT Rd, Kolkata 700108, W Bengal, India
关键词
Attribute-based encryption; user revocation; cloud computing; decentralized key management; mobile devices; ENCRYPTION;
D O I
10.1109/TCC.2017.2754255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fine grained access control is a requirement for data stored in untrusted servers like clouds. Owing to the large volume of data, decentralized key management schemes are preferred over centralized ones. Often encryption and decryption are quite expensive and not practical when users access data from resource constrained devices. We propose a decentralized attribute based encryption (ABE) scheme with fast encryption, outsourced decryption and user revocation. Our scheme is very specific to the context of mobile cloud as the storage of encrypted data and the partial decryption of ciphertexts are dependent on the cloud and users with mobile devices can upload data to the cloud or access data from it by incurring very little cost for encryption and decryption respectively. The main idea is to divide the encryption into two phases, offline preprocessing phase which is done when the device is otherwise not in use and an online phase when the data is actually encrypted with the policy. This makes encryption faster and more efficient than existing decentralized ABE schemes. For decryption outsourcing, data users need to generate a transformed version of the decryption key allowing an untrusted proxy server to partially decrypt the ciphertext without gaining any information about the plaintext. Data users can then fully decrypt the partially decrypted ciphertext without performing any costly pairing operations. We also introduce user revocation in this scheme without incurring too much additional cost in the online phase. Comparison with other ABE schemes shows that our scheme significantly reduces computation times for both data owners and data users and highly suitable for use in mobile devices.
引用
收藏
页码:124 / 137
页数:14
相关论文
共 51 条
[1]  
[Anonymous], TECH REP
[2]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[3]  
[Anonymous], P INT C S COMP COMM
[4]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
[5]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[6]   Temporal Access Control with User Revocation for Cloud Data [J].
Balani, Nihal ;
Ruj, Sushmita .
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, :336-342
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[9]  
Brown L, 2011, COLLOQUY, P34
[10]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565