Privacy preserving spatio-temporal attribute-based encryption for cloud applications

被引:0
|
作者
Routray, Kasturi [1 ]
Bera, Padmalochan [1 ]
机构
[1] Indian Inst Technol, Bhubaneswar, India
关键词
Time and location constraints; Decentralized key generation; Decryption outsourcing; Ciphertext policy attribute based encryption; Identity privacy; Location privacy; ACCESS-CONTROL; EFFICIENT; LOCATION; FINE;
D O I
10.1007/s10586-024-04696-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing offers scalable implementation of applications by sharing internet-based storage and computing resources. However, its ubiquitous nature introduces the security and privacy risks to sensitive data. Existing encryption techniques often rely on access control mechanisms to allow selective sharing of encrypted data. However, they don't efficiently support secure integration of space and time constraints in the authorization mechanism, rendering them unsuitable for dynamic cloud environments. In this paper, we propose a privacy-preserving spatio-temporal attribute-based access control technique for cloud-based applications. Our approach utilizes ciphertext policy attribute-based encryption (CP-ABE) with distributed key generation, geohashes for proximity detection, and fog server-based verification. The proposed cryptosystem generates decryption keys based only on the user's static attributes eliminating the need to manage user revocation due to frequent contextual changes. Time and location constraints are enforced through spatio-temporal locks in the access policy. Geohash enables defining authorized geographic areas while preserving user location privacy. Additionally, our system supports multiple attribute authorities for key generation, enhancing security by limiting user identity leakages and preventing key escrow attacks. Most of the decryption-related computations are outsourced to fog servers, thus, making the decryption independent of the number of attributes in the policies. The analysis of security and performance demonstrates the effectiveness of our scheme in practical cloud-based applications, enabling precise control over real-time data access while satisfying user privacy.
引用
收藏
页数:26
相关论文
共 50 条
  • [31] A Hybrid Two Layer Attribute Based Encryption for Privacy Preserving in Public Cloud
    Verma, Shiva
    Ahuja, Sachin
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 174 - 178
  • [32] POSTER: Temporal Attribute-Based Encryption in Clouds
    Zhu, Yan
    Hu, Hongxin
    Ahn, Gail-Joon
    Gong, Xiaorui
    Chen, Shimin
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 881 - 883
  • [33] Attribute-based learning for gait recognition using spatio-temporal interest points
    Kusakunniran, Worapan
    IMAGE AND VISION COMPUTING, 2014, 32 (12) : 1117 - 1126
  • [34] Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing
    Xiong, Hu
    Zhang, Hao
    Sun, Jianfei
    IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2739 - 2750
  • [35] Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services
    Huang, Qinlong
    Wei, Qinglin
    Yan, Guanyu
    Zou, Lin
    Yang, Yixian
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3348 - 3360
  • [36] Toward privacy-preserving verifiable DSSE for attribute-based cloud computing system
    Peng, Tianqi
    Gong, Bei
    Sun, Pengxuan
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (02):
  • [37] Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 285 - 291
  • [38] A privacy-preserving personal health record with searchability and revocability using attribute-based encryption
    Duan, Shuhong
    Liu, Zhenhua
    Zhou, Peilin
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 831 - 838
  • [39] Privacy-Preserving Auditing for Attribute-Based Credentials
    Camenisch, Jan
    Lehmann, Anja
    Neven, Gregory
    Rial, Alfredo
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 109 - 127
  • [40] Privacy Preserving System for Integrated Broadcast-broadband Services using Attribute-Based Encryption
    Ohtake, Go
    Ogawa, Kazuto
    Safavi-Naini, Reihaneh
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2015, 61 (03) : 328 - 335