Efficient Decentralized Attribute Based Access Control for Mobile Clouds

被引:53
作者
De, Sourya Joyee [1 ]
Ruj, Sushmita [2 ]
机构
[1] LORIA INRIA Nancy Grand Est, Villers Les Nancy, France
[2] Indian Stat Inst, Comp & Commun Sci Div, 203 BT Rd, Kolkata 700108, W Bengal, India
关键词
Attribute-based encryption; user revocation; cloud computing; decentralized key management; mobile devices; ENCRYPTION;
D O I
10.1109/TCC.2017.2754255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fine grained access control is a requirement for data stored in untrusted servers like clouds. Owing to the large volume of data, decentralized key management schemes are preferred over centralized ones. Often encryption and decryption are quite expensive and not practical when users access data from resource constrained devices. We propose a decentralized attribute based encryption (ABE) scheme with fast encryption, outsourced decryption and user revocation. Our scheme is very specific to the context of mobile cloud as the storage of encrypted data and the partial decryption of ciphertexts are dependent on the cloud and users with mobile devices can upload data to the cloud or access data from it by incurring very little cost for encryption and decryption respectively. The main idea is to divide the encryption into two phases, offline preprocessing phase which is done when the device is otherwise not in use and an online phase when the data is actually encrypted with the policy. This makes encryption faster and more efficient than existing decentralized ABE schemes. For decryption outsourcing, data users need to generate a transformed version of the decryption key allowing an untrusted proxy server to partially decrypt the ciphertext without gaining any information about the plaintext. Data users can then fully decrypt the partially decrypted ciphertext without performing any costly pairing operations. We also introduce user revocation in this scheme without incurring too much additional cost in the online phase. Comparison with other ABE schemes shows that our scheme significantly reduces computation times for both data owners and data users and highly suitable for use in mobile devices.
引用
收藏
页码:124 / 137
页数:14
相关论文
共 51 条
[21]  
Huiling Qian, 2013, Information and Communications Security. 15th International Conference, ICICS 2013. Proceedings: LNCS 8233, P363, DOI 10.1007/978-3-319-02726-5_26
[22]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[23]  
Jahid S., 2011, ASIACCS, P411
[24]  
Jung TH, 2013, IEEE INFOCOM SER, P2625
[25]  
Lai J., 2014, P 9 ACM S INF COMP C, P239, DOI DOI 10.1145/2590296.2590334
[26]   Improved Identity-Based Online/Offline Encryption [J].
Lai, Jianchang ;
Mu, Yi ;
Guo, Fuchun ;
Susilo, Willy .
INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 :160-173
[27]  
Lai JZ, 2014, LECT NOTES COMPUT SC, V8712, P273, DOI 10.1007/978-3-319-11203-9_16
[28]   Attribute-Based Encryption With Verifiable Outsourced Decryption [J].
Lai, Junzuo ;
Deng, Robert H. ;
Guan, Chaowen ;
Weng, Jian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) :1343-1354
[29]   Decentralizing Attribute-Based Encryption [J].
Lewko, Allison ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 :568-588
[30]  
Li D, 2013, 2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), P523, DOI 10.1109/ChinaCom.2013.6694651