Attribute-Based Information Flow Control

被引:2
作者
Han, Jinguang [1 ]
Bei, Maoxuan [2 ]
Chen, Liqun [3 ]
Xiang, Yang [4 ]
Cao, Jie [2 ]
Guo, Fuchun [5 ]
Meng, Weizhi [6 ]
机构
[1] Nanjing Univ Finance & Econ, Jiangsu Prov Key Lab E Business, Nanjing 210003, Jiangsu, Peoples R China
[2] Nanjing Univ Finance & Econ, Sch Informat Engn, Nanjing 200023, Jiangsu, Peoples R China
[3] Univ Surrey, Surrey Ctr Cyber Secur, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
[4] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
[5] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[6] Tech Univ Denmark, Dept Appl Math & Comp Sci, Copenhagen, Denmark
关键词
attribute-based system; information flow control; privacy-preserving authentication; outsourced computation; ACCESS-CONTROL; ENCRYPTION; ASSUMPTION; INTERNET; SCHEME; CLOUD;
D O I
10.1093/comjnl/bxz018
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information flow control (IFC) regulates where information is permitted to travel within information systems. To enforce IFC, access control encryption (ACE) was proposed to support both the no read-up rule and the no write-down rule. There are some problems in existing schemes. First, the communication cost is linear with the number of receivers. Second, senders are not authenticated, namely an unauthorized sender can send a message to a receiver. To reduce communication cost and implement sender authentication, we propose an attribute-based IFC (ABIFC) scheme by introducing attribute-based systems into IFC. Our ABIFC scheme captures the following features: (i) flexible IFC policies are defined over a universal set of descriptive attributes; (ii) both the no read-up rule and the no write-down rule are supported; (iii) the communication cost is linear with the number of required attributes, instead of receivers; (iv) receivers can outsource heavy computation to a server without compromising data confidentiality; (v) authorized senders can control release their attributes when sending messages to receivers. To the best of our knowledge, it is the first IFC scheme where flexible policies are defined over descriptive attributes and outsourced computation is supported.
引用
收藏
页码:1214 / 1231
页数:18
相关论文
共 51 条
  • [1] ON THE FEASIBILITY OF ATTRIBUTE-BASED ENCRYPTION ON INTERNET OF THINGS DEVICES
    Ambrosin, Moreno
    Anzanpour, Arman
    Conti, Mauro
    Dargahi, Tooska
    Moosavi, Sanaz Rahimi
    Rahmani, Amir M.
    Liljeberg, Pasi
    [J]. IEEE MICRO, 2016, 36 (06) : 25 - 35
  • [2] [Anonymous], 2017, INT J COMMUNICATION
  • [3] [Anonymous], 1973, MITRE Technical Report 2547
  • [4] Au MH, 2006, LECT NOTES COMPUT SC, V4116, P111
  • [5] Information Flow Control for Secure Cloud Computing
    Bacon, Jean
    Eyers, David
    Pasquier, Thomas F. J. -M.
    Singh, Jatinder
    Papagiannis, Ioannis
    Pietzuch, Peter
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2014, 11 (01): : 76 - 89
  • [6] Strengthening Access Control Encryption
    Badertscher, Christian
    Matt, Christian
    Maurer, Ueli
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 502 - 532
  • [7] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [8] Short signatures without random oracles and the SDH assumption in bilinear groups
    Boneh, Dan
    Boyen, Xavier
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (02) : 149 - 177
  • [9] Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
  • [10] Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
    Camenisch, Jan
    Drijvers, Manu
    Lehmann, Anja
    [J]. TRUST AND TRUSTWORTHY COMPUTING, (TRUST 2106), 2016, 9824 : 1 - 20