Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing

被引:81
作者
Xiong, Hu [1 ]
Zhang, Hao [1 ]
Sun, Jianfei [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Sichuan, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2019年 / 13卷 / 03期
基金
美国国家科学基金会;
关键词
Attribute-based broadcast encryption (ABBE); cloud computing; dynamic groups formation; privacy preserving; BROADCAST ENCRYPTION;
D O I
10.1109/JSYST.2018.2865221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The sharing of personal data with multiple users from different domains has been benefited considerably from the rapid advances of cloud computing, and it is highly desirable to ensure the sharing file should not be exposed to the unauthorized users or cloud providers. Unfortunately, issues such as achieving the flexible access control of the sharing file, preserving the privacy of the receivers, forming the receiver groups dynamically, and high efficiency in encryption/decryption still remain challenging. To deal with these challenges, we provide a novel anonymous attribute-based broadcast encryption (A(2) B-2 E) which features the property of hidden access policy and enables the data owner to share his/her data with multiple participants who are inside a predefined receiver set and fulfill the access policy. We first suggest a concrete A(2) B-2 E scheme together with the rigorous and formal security proof without the support of the random oracle model. Then, we design an efficient and secure data sharing system by incorporating the A(2) B-2 E scheme, verifiable outsourcing decryption technique for attribute-based encryption, and the idea of online/offline attribute-based encryption. Extensive security analysis and performance evaluation demonstrate that our data sharing system is secure and practical.
引用
收藏
页码:2739 / 2750
页数:12
相关论文
共 30 条
[1]  
[Anonymous], 1646, Opera Mathematica
[2]  
[Anonymous], 2013, JAVA PAIRING BASED C
[3]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Bold B., 1982, FAMOUS PROBLEMS GEOM, P1
[6]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[7]  
Fiat A., 1993, LNCS, P480, DOI [DOI 10.1007/3-540-48329-240, DOI 10.1007/3-540-48329-2]
[8]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[9]  
Jun Zhou, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P2398, DOI 10.1109/INFOCOM.2015.7218628
[10]  
Junod Pascal., 2010, Proc. ACM DRM'10, P13, DOI [10.1145/1866870.1866875, DOI 10.1145/1866870.1866875]