Attribute-based fine-grained access control for outscored private set intersection computation

被引:17
|
作者
Ali, Mohammad [1 ]
Mohajeri, Javad [2 ]
Sadeghi, Mohammad-Reza [1 ]
Liu, Ximeng [3 ,4 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
关键词
Fine-grained access control; Private set intersection; Cloud computing; Attribute-based encryption; SECURE;
D O I
10.1016/j.ins.2020.05.041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private set intersection (PSI) is a fundamental cryptographic protocol which has a wide range of applications. It enables two clients to compute the intersection of their private datasets without revealing non-matching elements. The advent of cloud computing drives the ambition to reduce computation and data management overhead by outsourcing such computations. However, since the cloud is not trustworthy, some cryptographic methods should be applied to maintain the confidentiality of datasets. But, in doing so, data owners may be excluded from access control on their outsourced datasets. Therefore, to control access rights and to interact with authorized users, they have to be online during the protocol. On the other hand, none of the existing cloud-based PSI schemes support fine-grained access control over outsourced datasets. This paper, for the first time, proposes an attribute-based private set intersection (AB-PSI) scheme providing fine-grained access control. AB-PSI allows a data owner to control intersection computations on its outsourced dataset by defining an access control policy. We also provide security definitions for an AB-PSI scheme and prove the security of our scheme in the standard model. We implement our scheme and report performance evaluation results. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:222 / 243
页数:22
相关论文
共 50 条
  • [1] Attribute-Based Fine-Grained Access Control with User Revocation
    Ye, Jun
    Zhang, Wujun
    Wu, Shu-lin
    Gao, Yuan-yuan
    Qiu, Jia-tao
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 586 - 595
  • [2] An Attribute-Based Fine-Grained Access Control Mechanism for HBase
    Huang, Liangqiang
    Zhu, Yan
    Wang, Xin
    Khurshid, Faisal
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PT I, 2019, 11706 : 44 - 59
  • [3] Blind attribute-based encryption and oblivious transfer with fine-grained access control
    Alfredo Rial
    Designs, Codes and Cryptography, 2016, 81 : 179 - 223
  • [4] Blind attribute-based encryption and oblivious transfer with fine-grained access control
    Rial, Alfredo
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 81 (02) : 179 - 223
  • [5] Attribute-Based Encryption for Fine-Grained Access Control on Secure Hybrid Clouds
    Vulapula, Sridhar Reddy
    Malladi, Srinivas
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (10) : 380 - 387
  • [6] A Novel Attribute-based Access Control System for Fine-Grained Privacy Protection
    Son, Ha Xuan
    Nguyen Minh Hoang
    PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, : 76 - 80
  • [7] Fine-grained access control system based on fully outsourced attribute-based encryption
    Zhang, Rui
    Ma, Hui
    Lu, Yao
    JOURNAL OF SYSTEMS AND SOFTWARE, 2017, 125 : 344 - 353
  • [8] Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems
    Zhao, Fangming
    Nishide, Takashi
    Sakurai, Kouichi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 83 - 97
  • [9] Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing
    Li, Peng
    Lai, Junzuo
    Wu, Yongdong
    FRONTIERS OF COMPUTER SCIENCE, 2023, 17 (01)
  • [10] Towards a Fine-Grained Privacy-Enabled Attribute-Based Access Control Mechanism
    Que Nguyet Tran Thi
    Tran Khanh Dang
    TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGECENTERED SYSTEMS XXXVI: SPECIAL ISSUE ON DATA AND SECURITY ENGINEERING, 2018, 10720 : 52 - 72