PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT

被引:119
|
作者
Belguith, Sana [1 ,2 ]
Kaaniche, Nesrine [3 ]
Laurent, Maryline [3 ]
Jemai, Abderrazak [4 ]
Attia, Rabah [1 ]
机构
[1] Univ Carthage, Ecole Polytech Tunisie, SERCom Lab, Tunis, Tunisia
[2] Telnet Holding, Telnet Innovat Labs, Tunis, Tunisia
[3] Univ Paris Saclay, CNRS, Telecom SudParis, SAMOVAR, Paris, France
[4] Univ Sci Tunis, Lab LIP2, Tunis, Tunisia
关键词
Attribute based encryption; Hidden policy; Decryption outsourcing; Cloud computing; Privacy; Data security; CONSTANT-SIZE KEYS; CP-ABE; ACCESS-CONTROL; SECRET KEYS; INTERNET; DEVICES; SCHEME;
D O I
10.1016/j.comnet.2018.01.036
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly shared access policies, thus leading to possible users' privacy leakage. In this paper, we introduce PHOABE, a Policy-Hidden Outsourced ABE scheme. Our construction presents several advantages. First, it is a multi-attribute authority ABE scheme. Second, the expensive computations for the ABE decryption process is partially delegated to a Semi Trusted Cloud Server. Third, users' privacy is protected thanks to a hidden access policy. Fourth, PHOABE is proven to be selectively secure, verifiable and policy privacy preserving under the random oracle model. Five, estimation of the processing overhead proves its feasibility in IoT constrained environments. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:141 / 156
页数:16
相关论文
共 50 条
  • [1] Multi-Authority Attribute Based Encryption With Policy-hidden and Accountability
    Zhang, Wei
    Zhang, ZhiShuo
    Wu, Yi
    [J]. 2020 INTERNATIONAL CONFERENCE ON SPACE-AIR-GROUND COMPUTING (SAGC 2020), 2020, : 95 - 96
  • [2] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    [J]. SOFT COMPUTING, 2018, 22 (01) : 243 - 251
  • [3] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Hong Zhong
    Wenlong Zhu
    Yan Xu
    Jie Cui
    [J]. Soft Computing, 2018, 22 : 243 - 251
  • [4] Multi-authority attribute based encryption
    Chase, Melissa
    [J]. Theory of Cryptography, Proceedings, 2007, 4392 : 515 - 534
  • [5] Multi-authority Based Weighted Attribute Encryption Scheme in Cloud Computing
    Wang, Yun
    Zhang, Dalei
    Zhong, Hong
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 1033 - 1038
  • [6] Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage
    Fan Yundong
    Wu Xiaoping
    Wang Jiasheng
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 205 - 212
  • [7] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [8] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    [J]. ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164
  • [9] Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption
    Nissenbaum, O. V.
    Ponomarov, K. Y.
    Zaharov, A. A.
    [J]. METROLOGY, STANDARDIZATION, QUALITY: THEORY AND PRACTICE, (MSQ-2017), 2018, 998
  • [10] Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
    Ming, Yang
    He, Baokang
    Wang, Chenhao
    [J]. IEEE ACCESS, 2021, 9 : 42593 - 42603