Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage

被引:35
|
作者
Zhang, Zhiting [1 ]
Zeng, Peng [1 ]
Pan, Bofeng [1 ]
Choo, Kim-Kwang Raymond [2 ,3 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[3] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 10期
关键词
Cloud computing; Encryption; Internet of Things; Access control; Computer security; Accountability; attribution-based encryption; cloud storage; key abuse; key escrow; large universe; public traceability; selectively security; ACCESS-CONTROL; CP-ABE; VERIFIABILITY;
D O I
10.1109/JIOT.2020.2986303
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) can be utilized to achieve both data security and fine-grained access control in a cloud computing environment. However, we need to consider the risks of key abuse and key escrow in such a setting. Specifically, the former risk category includes the illegal sharing of user's keys (i.e., user key abuse) and illegal key distribution by an authority (i.e., authority key abuse), and the latter includes the scenario where some ciphertext is decrypted by the authority without the user's approval. Hence, in this article, we seek to address both key abuse and key escrow concerns when deploying ABE in a cloud computing environment. In our construction, two authorities [i.e., a key generation center (KGC) and an attribute authority (AA)] participate in the generation of the user's secret key. Both KGC and AA will not know the full decryption key or have the capability to forge one. As a result, neither KGC nor AA can illegally distribute the user's private key to unauthorized users or decrypt user's ciphertexts without the user's approval. In addition, in our scheme, any private keys modified by malicious users cannot be successfully used for decryption. In the event that some user illegally shares his/her original private key, the scheme has in place a mechanism to trace the abused private key (since the user's identity information is embedded in the private key). Hence, our scheme supports public traceability, key abuse, and key escrow. In addition, our scheme is based on prime order bilinear groups, and is shown to be selectively secure in the standard model.
引用
收藏
页码:10314 / 10323
页数:10
相关论文
共 50 条
  • [1] Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
    Kai Zhang
    Hui Li
    Jianfeng Ma
    Ximeng Liu
    [J]. Science China Information Sciences, 2018, 61
  • [2] Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures
    Zhang, Yinghui
    Li, Jin
    Zheng, Dong
    Chen, Xiaofeng
    Li, Hui
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 509 - 524
  • [3] Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
    Kai ZHANG
    Hui LI
    Jianfeng MA
    Ximeng LIU
    [J]. Science China(Information Sciences), 2018, 61 (03) : 16 - 28
  • [4] Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
    Zhang, Kai
    Li, Hui
    Ma, Jianfeng
    Liu, Ximeng
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [5] Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
    Rouselakis, Yannis
    Waters, Brent
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 : 315 - 332
  • [6] Large Universe Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage
    Lian, Huijie
    Wang, Qingxian
    Wang, Guangbo
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (01) : 107 - 117
  • [7] Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things
    Zeng, Peng
    Zhang, Zhiting
    Lu, Rongxing
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10963 - 10972
  • [8] Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Wei, Lifei
    Lin, Xiaodong
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 55 - 72
  • [9] An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage
    Wu, Qing
    Meng, Guoqiang
    Zhang, Leyou
    Lei, Yue
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 153
  • [10] Generic attribute revocation systems for attribute-based encryption in cloud storage
    Genlang Chen
    Zhiqian Xu
    Jia-jian Zhang
    Guo-jun Wang
    Hai Jiang
    Miao-qing Huang
    [J]. Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 773 - 786