Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing

被引:5
作者
Shynu, P. G. [1 ]
Singh, K. John [1 ]
机构
[1] VIT Univ Vellore, Sch Informat Technol & Engn, Vellore, Tamil Nadu, India
关键词
cloud computing; multi-authority attribute-based encryption techniques; MA-ABE; privacy preserving secret key extraction protocol; PPSE; fuzzy attribute set;
D O I
10.1504/IJES.2018.10014925
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the existing privacy-preserving multi-authority attribute-based encryption (MA-ABE) techniques, the users receive their secret keys from multiple authorities, where each authority maintains a different set of user attributes with major control established by a central authority (CA), who manages all the attribute-related activities (causes collision attack). Also, as the secret key is derived from user sensitive attributes, the authorities may collect and analyse the user attributes to recognise a user's identity which leads to compromised key attack and insider attack. In order to solve these issues, we propose a privacy preserving secret key extraction (PPSE) protocol, which stores user attributes in fuzzy attribute set format over hash index. This enables easier extraction of the secret key from outsourced user attributes and it eliminates the need for the involvement of a central authority for user attribute management. We implemented PPSE using Charm crypto (Akinyele et al., 2013) and the experimental results show that our scheme provides higher levels of user access provision with improved security and privacy.
引用
收藏
页码:287 / 300
页数:14
相关论文
共 47 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]   Automated wireless video surveillance: an evaluation framework [J].
Alsmirat, Mohammad A. ;
Jararweh, Yaser ;
Obaidat, Islam ;
Gupta, Brij B. .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2017, 13 (03) :527-546
[3]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[4]   Attribute-based encryption schemes with constant-size ciphertexts [J].
Attrapadung, Nuttapong ;
Herranz, Javier ;
Laguillaumie, Fabien ;
Libert, Benoit ;
de Panafieu, Elie ;
Rafols, Carla .
THEORETICAL COMPUTER SCIENCE, 2012, 422 :15-38
[5]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[6]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]   Multi-authority attribute-based encryption with honest-but-curious central authority [J].
Bozovic, Vladimir ;
Socek, Daniel ;
Steinwandt, Rainer ;
Villanyi, Viktoria I. .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (03) :268-283
[9]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[10]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121