Large universe attribute based access control with efficient decryption in cloud storage system

被引:45
作者
Fu, Xingbing [1 ]
Nie, Xuyun [2 ]
Wu, Ting [1 ]
Li, Fagen [3 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Zhejiang, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu, Sichuan, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Sichuan, Peoples R China
基金
国家高技术研究发展计划(863计划); 美国国家科学基金会;
关键词
Attribute based encryption; Decryption outsourcing; Fine grained access control; Large universe construction; Cloud storage;
D O I
10.1016/j.jss.2017.10.020
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Ciphertext Policy Attribute Based Encryption scheme is a promising technique for access control in the cloud storage, since it allows the data owner to define access policy over the outsourced data. However, the existing attribute based access control mechanism in the cloud storage is based on small universe construction, where the attribute set is defined at setup, and the size of the public parameters scales with the number of attributes. A large number of new attributes need to be added to the system over time, small universe attribute based access control is no longer suitable for cloud storage, whereas large universe attribute based encryption where any string can be employed as an attribute and attributes are not required to be enumerated at system setup meets this requirement. Unfortunately, one of the main efficiency drawbacks of existing large universe attribute based encryption is that ciphertext size and decryption time scale with the complexity of the access structure. In this work, we propose large universe attribute based access control scheme with efficient decryption. The user provides the cloud computing server with a transformation key with which the cloud computing server transforms the ciphertext associated with the access structure satisfied by the attributes associated with the private key into a simple and short ciphertext; thus it significantly reduces the time for the user to decrypt the ciphertext without the cloud computing server knowing the underlying plaintext; the user can check whether the transformation done by the cloud computing server is correct to verify transformation correctness. Security analysis and performance evaluation show our scheme is secure and efficient. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:157 / 164
页数:8
相关论文
共 22 条
[1]  
[Anonymous], 2011, PROC INT WORKSHOP PU
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[4]  
Boneh D., 2004, EUROCRYPT 2004
[5]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565
[6]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[7]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[8]  
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[9]  
Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
[10]  
Joseph A, 2011, 2011617 CRYPT EPRINT