Privacy preserving spatio-temporal attribute-based encryption for cloud applications

被引:0
|
作者
Routray, Kasturi [1 ]
Bera, Padmalochan [1 ]
机构
[1] Indian Inst Technol, Bhubaneswar, India
关键词
Time and location constraints; Decentralized key generation; Decryption outsourcing; Ciphertext policy attribute based encryption; Identity privacy; Location privacy; ACCESS-CONTROL; EFFICIENT; LOCATION; FINE;
D O I
10.1007/s10586-024-04696-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing offers scalable implementation of applications by sharing internet-based storage and computing resources. However, its ubiquitous nature introduces the security and privacy risks to sensitive data. Existing encryption techniques often rely on access control mechanisms to allow selective sharing of encrypted data. However, they don't efficiently support secure integration of space and time constraints in the authorization mechanism, rendering them unsuitable for dynamic cloud environments. In this paper, we propose a privacy-preserving spatio-temporal attribute-based access control technique for cloud-based applications. Our approach utilizes ciphertext policy attribute-based encryption (CP-ABE) with distributed key generation, geohashes for proximity detection, and fog server-based verification. The proposed cryptosystem generates decryption keys based only on the user's static attributes eliminating the need to manage user revocation due to frequent contextual changes. Time and location constraints are enforced through spatio-temporal locks in the access policy. Geohash enables defining authorized geographic areas while preserving user location privacy. Additionally, our system supports multiple attribute authorities for key generation, enhancing security by limiting user identity leakages and preventing key escrow attacks. Most of the decryption-related computations are outsourced to fog servers, thus, making the decryption independent of the number of attributes in the policies. The analysis of security and performance demonstrates the effectiveness of our scheme in practical cloud-based applications, enabling precise control over real-time data access while satisfying user privacy.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare
    Meng, Dacheng
    Luo, Entao
    Wang, Guojun
    PROCEEDINGS 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS 2016), 2016, : 299 - 306
  • [42] AN ATTRIBUTE-BASED FRAMEWORK FOR PRIVACY PRESERVING IMAGE QUERYING
    Rane, Shantanu
    Sun, Wei
    2012 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2012), 2012, : 2649 - 2652
  • [43] Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search
    Shi, Junbin
    Yu, Qiming
    Yu, Yong
    Wang, Lianhai
    Zhang, Wenzheng
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 12152 - 12168
  • [44] Searchable attribute-based encryption scheme with attribute revocation in cloud storage
    Wang, Shangping
    Zhao, Duqiao
    Zhang, Yaling
    PLOS ONE, 2017, 12 (08):
  • [45] Protecting data in cloud environment with attribute-based encryption
    Zhu, Shuaishuai
    Yang, Xiaoyuan
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (02) : 91 - 97
  • [46] Generic attribute revocation systems for attribute-based encryption in cloud storage
    Genlang Chen
    Zhiqian Xu
    Jia-jian Zhang
    Guo-jun Wang
    Hai Jiang
    Miao-qing Huang
    Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 773 - 786
  • [47] Generic attribute revocation systems for attribute-based encryption in cloud storage
    Chen, Genlang
    Xu, Zhiqian
    Zhang, Jia-jian
    Wang, Guo-jun
    Jiang, Hai
    Huang, Miao-qing
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (06) : 773 - 786
  • [48] Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
    Yang, Yan
    Chen, Xingyuan
    Chen, Hao
    Du, Xuehui
    IEEE ACCESS, 2018, 6 : 18009 - 18021
  • [49] Location Privacy Preserving Scheme Based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    Ke, Yan
    Yang, Xiaoyuan
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 164 - 177
  • [50] Privacy Preserving Ciphertext Policy Attribute Based Encryption
    Balu, A.
    Kuppusamy, K.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 402 - 409