Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations

被引:31
作者
Sun, Shi-Feng [1 ]
Lyu, Chen [1 ]
Gu, Dawu [1 ]
Zhang, Yuanyuan [1 ]
Ren, Yanli [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
中国国家自然科学基金; 上海市自然科学基金;
关键词
ATTRIBUTE-BASED ENCRYPTION; MOBILE;
D O I
10.1155/2015/857405
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the pervasiveness of mobile communications, MSNs have become a promising networking paradigm for users to share contents with others through mobile devices. This convenience comes at the cost of some serious security and privacy issues. In this work, we propose a novel privacy-preserving scheme for MSNs, which can efficiently solve some of the most serious security and privacy issues such as data confidentiality, fine-grained access control, and flexible revocation. In particular, we leverage the attribute based encryption technique to realize fine-grained access control over encrypted data. Moreover, we enhance this technique and design a flexible and fine-grained revocation mechanism which enables not only efficient user revocation but also efficient attribute revocation. As we show, our system can achieve both forward secrecy and backward secrecy using such mechanism. We compare our scheme with other related works and show that not only most of the previous works suffer from larger size of encrypted data but also their decryption time grows linearly with the complexity of access policies. In comparison, our scheme achieves higher efficiency and smaller computation time while consuming lesser storage space. We provide extensive analysis and performance evaluation to demonstrate the security, scalability, and efficiency of our proposed framework.
引用
收藏
页数:15
相关论文
共 35 条
[1]  
[Anonymous], CONVERSATIONS INTERN
[2]   Persona: An Online Social Network with User-Defined Privacy [J].
Baden, Randy ;
Bender, Adam ;
Spring, Neil ;
Bhattacharjee, Bobby ;
Starin, Daniel .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2009, 39 (04) :135-146
[3]  
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[4]  
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[8]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[9]  
di Vimercati S.D. C., 2007, P 33 INT C VERY LARG, P123
[10]  
Dong W, 2011, IEEE INFOCOM SER, P1647, DOI 10.1109/INFCOM.2011.5934958