Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing

被引:21
作者
Qiao, Huidong [1 ,2 ]
Ren, Jiangchun [1 ]
Wang, Zhiying [1 ]
Ba, Haihe [1 ]
Zhou, Huaizhe [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[2] Hunan Inst Engn, Coll Comp & Commun, Xiangtan 411100, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 88卷
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Ciphertext-policy attribute-based; encryption; Fog computing; Black-box traceability; Compulsory traceability; CP-ABE; SECURITY;
D O I
10.1016/j.future.2018.05.032
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the structure of fog systems, ciphertext-policy attribute-based encryption (CP-ABE) is regarded as a promising technique to address certain security problems present in the fog. Unfortunately, in most traditional CP-ABE systems, a user can deliberately leak his attribute keys to others or use his private key to build a decryption device and provide a decryption service with little risk of being caught (untraceable). We refer to this behavior as privilege abuse. The privilege abuse problem will seriously hinder the adoption of CP-ABE. To address the problem, we propose a novel black-box traceable CP-ABE scheme that is much simpler than the existing white-box traceable schemes, A malicious user who builds a decryption black-box can be tracked and exposed by our scheme. Due to its scalability and relatively high efficiency, the scheme could be practical for fog systems. Furthermore, we point out that, if the adversary can distinguish the tracing ciphertext from the normal ciphertext, he can frustrate tracking by outputting incorrect decryption results. Thus, the traceability must be compulsory, so as to ensure that the adversary cannot distinguish between the tracing ciphertext and the normal ciphertext. Therefore, we present a formal definition of compulsory traceability with a new security game, and our scheme is proved to be secure and compulsory traceable under the generic group model. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:107 / 116
页数:10
相关论文
共 40 条
[1]   An Attribute-Based Encryption Scheme to Secure Fog Communications [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Xing, Xiaoshuang ;
Cheng, Xiuzhen .
IEEE ACCESS, 2017, 5 :9131-9138
[2]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[3]   An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption [J].
Balu, A. ;
Kuppusamy, K. .
INFORMATION SCIENCES, 2014, 276 :354-362
[4]  
Bellare M., 1993, ACM CCS 93, P62
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[7]  
Bonomi F., 2012, P MCCWORKSHOP MOB CL, P13, DOI 10.1145/2342509.2342513
[8]  
Chen C, 2011, LECT NOTES COMPUT SC, V6980, P84, DOI 10.1007/978-3-642-24316-5_8
[9]   Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage [J].
Cheng, Yong ;
Wang, Zhi-ying ;
Ma, Jun ;
Wu, Jiang-jiang ;
Mei, Song-zhu ;
Ren, Jiang-chun .
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (02) :85-97
[10]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456