Privacy preserving spatio-temporal attribute-based encryption for cloud applications

被引:0
|
作者
Routray, Kasturi [1 ]
Bera, Padmalochan [1 ]
机构
[1] Indian Inst Technol, Bhubaneswar, India
关键词
Time and location constraints; Decentralized key generation; Decryption outsourcing; Ciphertext policy attribute based encryption; Identity privacy; Location privacy; ACCESS-CONTROL; EFFICIENT; LOCATION; FINE;
D O I
10.1007/s10586-024-04696-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing offers scalable implementation of applications by sharing internet-based storage and computing resources. However, its ubiquitous nature introduces the security and privacy risks to sensitive data. Existing encryption techniques often rely on access control mechanisms to allow selective sharing of encrypted data. However, they don't efficiently support secure integration of space and time constraints in the authorization mechanism, rendering them unsuitable for dynamic cloud environments. In this paper, we propose a privacy-preserving spatio-temporal attribute-based access control technique for cloud-based applications. Our approach utilizes ciphertext policy attribute-based encryption (CP-ABE) with distributed key generation, geohashes for proximity detection, and fog server-based verification. The proposed cryptosystem generates decryption keys based only on the user's static attributes eliminating the need to manage user revocation due to frequent contextual changes. Time and location constraints are enforced through spatio-temporal locks in the access policy. Geohash enables defining authorized geographic areas while preserving user location privacy. Additionally, our system supports multiple attribute authorities for key generation, enhancing security by limiting user identity leakages and preventing key escrow attacks. Most of the decryption-related computations are outsourced to fog servers, thus, making the decryption independent of the number of attributes in the policies. The analysis of security and performance demonstrates the effectiveness of our scheme in practical cloud-based applications, enabling precise control over real-time data access while satisfying user privacy.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing
    Yogesh Deshmukh J.
    Yadav S.K.
    Bhandari G.M.
    Materials Today: Proceedings, 2023, 80 : 1786 - 1791
  • [2] Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing
    Lyu, Maoxu
    Li, Xuejun
    Li, Hui
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 195 - 204
  • [3] An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage
    Huang, Chanying
    Wei, Songjie
    Fu, Anmin
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (11)
  • [4] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292
  • [5] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Axin Wu
    Yinghui Zhang
    Xiaokun Zheng
    Rui Guo
    Qinglan Zhao
    Dong Zheng
    Annals of Telecommunications, 2019, 74 : 401 - 411
  • [6] Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption
    Liang, Pengfei
    Zhang, Leyou
    Shang, Yujie
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 66 - 80
  • [7] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Wu, Axin
    Zhang, Yinghui
    Zheng, Xiaokun
    Guo, Rui
    Zhao, Qinglan
    Zheng, Dong
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 401 - 411
  • [8] Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud
    Song, Yujiao
    Wang, Hao
    Wei, Xiaochao
    Wu, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [9] Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud
    Najafi, Aniseh
    Bayat, Majid
    Javadi, Hamid Haj Seyyed
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 13 (02): : 87 - 100
  • [10] Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
    Petrlic, Ronald
    Sorge, Christoph
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,