Privacy preserving spatio-temporal attribute-based encryption for cloud applications

被引:0
|
作者
Routray, Kasturi [1 ]
Bera, Padmalochan [1 ]
机构
[1] Indian Inst Technol, Bhubaneswar, India
关键词
Time and location constraints; Decentralized key generation; Decryption outsourcing; Ciphertext policy attribute based encryption; Identity privacy; Location privacy; ACCESS-CONTROL; EFFICIENT; LOCATION; FINE;
D O I
10.1007/s10586-024-04696-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing offers scalable implementation of applications by sharing internet-based storage and computing resources. However, its ubiquitous nature introduces the security and privacy risks to sensitive data. Existing encryption techniques often rely on access control mechanisms to allow selective sharing of encrypted data. However, they don't efficiently support secure integration of space and time constraints in the authorization mechanism, rendering them unsuitable for dynamic cloud environments. In this paper, we propose a privacy-preserving spatio-temporal attribute-based access control technique for cloud-based applications. Our approach utilizes ciphertext policy attribute-based encryption (CP-ABE) with distributed key generation, geohashes for proximity detection, and fog server-based verification. The proposed cryptosystem generates decryption keys based only on the user's static attributes eliminating the need to manage user revocation due to frequent contextual changes. Time and location constraints are enforced through spatio-temporal locks in the access policy. Geohash enables defining authorized geographic areas while preserving user location privacy. Additionally, our system supports multiple attribute authorities for key generation, enhancing security by limiting user identity leakages and preventing key escrow attacks. Most of the decryption-related computations are outsourced to fog servers, thus, making the decryption independent of the number of attributes in the policies. The analysis of security and performance demonstrates the effectiveness of our scheme in practical cloud-based applications, enabling precise control over real-time data access while satisfying user privacy.
引用
收藏
页数:26
相关论文
共 50 条
  • [21] Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing
    Shynu, P. G.
    Singh, K. John
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (04) : 287 - 300
  • [22] Privacy preserving ciphertext-policy attribute-based broadcast encryption in smart city
    Yilei C.
    Leyou Z.
    Journal of China Universities of Posts and Telecommunications, 2019, 26 (01): : 21 - 31
  • [23] A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities
    Shen, Xieyang
    Huang, Chuanhe
    Wang, Danxin
    Shi, Jiaoli
    Wireless Communications and Mobile Computing, 2021, 2021
  • [24] Privacy preserving ciphertext-policy attribute-based broadcast encryption in smart city
    Cui Yilei
    Zhang Leyou
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2019, 26 (01) : 21 - 31
  • [25] A privacy-preserving data sharing system with decentralized attribute-based encryption scheme
    Kang, Li
    Zhang, Leyou
    International Journal of Network Security, 2020, 22 (05) : 815 - 827
  • [26] Survey on attribute-based encryption in cloud computing
    Ancy, P.R.
    Krishna, Addapalli V.N.
    Balachandran, K.
    Balamurugan, M.
    Prakasi, O.S. Gnana
    Ancy, P.R. (ancy.prasadam@res.christuniversity.in), 1600, Femto Technique Co., Ltd. (22): : 863 - 868
  • [27] Attribute-based Encryption in Cloud Computing Environment
    Yan, Yuping
    Kamel, Mohammed B. M.
    Ligeti, Peter
    2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, : 63 - 68
  • [28] A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain
    Zhao, Yujuan
    Cui, Baojiang
    Xu, Jie
    CYBER SECURITY, CNCERT 2021, 2022, 1506 : 27 - 36
  • [29] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577
  • [30] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    INFOCOMMUNICATIONS JOURNAL, 2015, 7 (02): : 1 - 9