Privacy-Preserving Data Processing with Flexible Access Control

被引:51
|
作者
Ding, Wenxiu [1 ]
Yan, Zheng [2 ,3 ]
Deng, Robert H. [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Changan Qu 710126, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, 2 South Taibai Rd, Xian 710071, Peoples R China
[3] Aalto Univ, Dept Commun & Networking, Konemiehentie 2,POB 15400, Espoo 02150, Finland
[4] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
基金
芬兰科学院;
关键词
Cloud computing; Access control; Encryption; Data processing; Process control; Computational efficiency; Homomorphic encryption; privacy preservation; data sharing; attribute-based encryption; HOMOMORPHIC ENCRYPTION; COMPUTATION; EFFICIENT;
D O I
10.1109/TDSC.2017.2786247
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides an efficient and convenient platform for cloud users to store, process and control their data. Cloud overcomes the bottlenecks of resource-constrained user devices and greatly releases their storage and computing burdens. However, due to the lack of full trust in cloud service providers, the cloud users generally prefer to outsource their sensitive data in an encrypted form, which, however, seriously complicates data processing, analysis, as well as access control. Homomorphic encryption (HE) as a single key system cannot flexibly control data sharing and access after encrypted data processing. How to realize various computations over encrypted data in an efficient way and at the same time flexibly control the access to data processing results has been an important challenging issue. In this paper, we propose a privacy-preserving data processing scheme with flexible access control. With the cooperation of a data service provider (DSP) and a computation party (CP), our scheme, based on Paillier's partial homomorphic encryption (PHE), realizes seven basic operations, i.e., Addition, Subtraction, Multiplication, Sign Acquisition, Absolute, Comparison, and Equality Test, over outsourced encrypted data. In addition, our scheme, based on the homomorphism of attribute-based encryption (ABE), is also designed to support flexible access control over processing results of encrypted data. We further prove the security of our scheme and demonstrate its efficiency and advantages through simulations and comparisons with existing work.
引用
收藏
页码:363 / 376
页数:14
相关论文
共 50 条
  • [1] Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things
    Zhang, Leyou
    Wang, Jun
    Mu, Yi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (19) : 14731 - 14745
  • [2] An Extended Framework of Privacy-Preserving Computation With Flexible Access Control
    Ding, Wenxiu
    Hu, Rui
    Yan, Zheng
    Qian, Xinren
    Deng, Robert H.
    Yang, Laurence T.
    Dong, Mianxiong
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02): : 918 - 930
  • [3] Privacy-Preserving Distributed Data Access Control for CloudIoT
    Nasiraee, Hassan
    Ashouri-Talouki, Maede
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2476 - 2487
  • [4] Privacy-Preserving Distribution and Access Control of Personalized Healthcare Data
    Rajput, Amitesh Singh
    Raman, Balasubramanian
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (08) : 5584 - 5591
  • [5] Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data
    Smithamol, Mukalel Bhaskaran
    Sridhar, Rajeswari
    [J]. ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2017, 17 (02) : 31 - 38
  • [6] Privacy-Preserving Access Control Model for Big Data Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    [J]. 2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 130 - 135
  • [7] Succinct representation of flexible and privacy-preserving access rights
    Blanton, Marina
    Atallah, Mikhail
    [J]. VLDB JOURNAL, 2006, 15 (04): : 334 - 354
  • [8] Succinct representation of flexible and privacy-preserving access rights
    Marina Blanton
    Mikhail Atallah
    [J]. The VLDB Journal, 2006, 15 : 334 - 354
  • [9] An Access Control Scheme With Privacy-Preserving Authentication and Flexible Revocation for Smart Healthcare
    Liang, Xiyu
    Liu, Yali
    Ning, Jianting
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2024, 28 (06) : 3269 - 3278
  • [10] Cloud Data Security Access with Privacy-Preserving
    Wang, Jingyu
    Gu, Ruichun
    [J]. 2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 268 - 271