Owner Specified Excessive Access Control for Attribute Based Encryption

被引:9
作者
Khan, Fawad [1 ,2 ]
Li, Hui [2 ]
Zhang, Liangxuan [2 ]
机构
[1] Xidian Univ, Sch Int Educ, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute; partial; full; encryption; decryption; symmetric key; chunk; excessive access; repetition; fractional; EFFICIENT;
D O I
10.1109/ACCESS.2016.2632132
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) has emerged as a promising solution for access control to diverse set of users in cloud computing systems. Policy can just specify whether (or not) any specific user should be given access to data, but it lacks to provide data owner the privilege to specify (how much) fraction, or (which) specific chunk from that data to be accessed or decrypted. In this paper, we address this issue, and propose a scheme that will give data owner excessive access control, so that he can specify specific chunk out of total data to be accessed by user depending on his attributes. In our scheme, a data owner can encrypt data over attributes specified in a policy, but even if user's attributes satisfy the policy; he can decrypt data (partially or fully) fractionally based on his attributes specified by owner. The owner can also prioritize user's access based on his designation, or hierarchal role in a specific organization. We also address to resolve the issue of attributes repetition, due to which the cost of computations in encryption by owner and ciphertext size is reduced. Furthermore, we achieve it with a single ciphertext over policy for entire data, and proof our scheme to be secure in the generic group and random oracle model. Theoretical comparisons of computations with existing constructions, and performance of the scheme evaluated in the Charm simulator is reasonable enough to be adopted in practice.
引用
收藏
页码:8967 / 8976
页数:10
相关论文
共 34 条
[11]  
di Vimercati S.D. C., 2007, P 33 INT C VERY LARG, P123
[12]  
di Vimercati SD, 2007, CSAW'07: PROCEEDINGS OF THE 2007 ACM COMPUTER SECURITY ARCHITECTURE WORKSHOP, P63
[13]  
Doshi N., 2011, P IEEE INT C COMP CO, P515
[14]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[15]  
Lai JZ, 2011, LECT NOTES COMPUT SC, V6672, P24, DOI 10.1007/978-3-642-21031-0_3
[16]   Decentralizing Attribute-Based Encryption [J].
Lewko, Allison ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 :568-588
[17]   Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption [J].
Lewko, Allison ;
Okamoto, Tatsuaki ;
Sahai, Amit ;
Takashima, Katsuyuki ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 :62-+
[18]  
Li J, 2009, LECT NOTES COMPUT SC, V5735, P347
[19]  
Liu Zhen, 2010, IACR CRYPTOLOGY EPRI
[20]  
Ma TY, 2007, 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, P399