Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing

被引:29
|
作者
Yang, Yan [1 ,2 ]
Chen, Xingyuan [1 ,2 ,3 ]
Chen, Hao [4 ]
Du, Xuehui [2 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
[2] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Henan, Peoples R China
[3] State Key Lab Cryptol, Beijing 100878, Peoples R China
[4] China Acad Space Technol, State Key Lab Space Ground Integrated Informat Te, Beijing 100029, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
国家高技术研究发展计划(863计划);
关键词
Attribute-based encryption; decentralizing multi-authority attribute-based encryption; dual system encryption; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; HIBE;
D O I
10.1109/ACCESS.2018.2820182
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Decentralizing multi-authority attribute-based encryption (ABE) has been adopted for solving problems arising from sharing confidential corporate data in cloud computing. For decentralizing multi authority ABE systems that do not rely on a central authority, collusion resistance can be achieved using a global identifier. Therefore, identity needs to be managed globally, which results in the crucial problems of privacy and security. A scheme is developed that does not use a central authority to manage users and keys, and only simple trust relations need to be formed by sharing the public key between each attribute authority (AA). User identities are unique by combining a user's identity with the identity of the AA where the user is located. Once a key request needs to be made to an authority outside the domain, the request needs to be performed by the authority in the current domain rather than by the users, so, user identities remain private to the AA outside the domain, which will enhance privacy and security. In addition, the key issuing protocol between AA is simple as the result of the trust relationship of AA. Moreover, extensibility for authorities is also supported by the scheme presented in this paper. The scheme is based on composite order bilinear groups. A proof of security is presented that uses the dual system encryption methodology.
引用
收藏
页码:18009 / 18021
页数:13
相关论文
共 50 条
  • [1] Correction to "Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing''
    Tan, Syh-Yuan
    IEEE ACCESS, 2019, 7 : 17045 - 17049
  • [2] Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
    Chase, Melissa
    Chow, Sherman S. M.
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 121 - 130
  • [3] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [4] Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
    Kang, Li
    Zhang, Leyou
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 3 - 18
  • [5] Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing
    Shynu, P. G.
    Singh, K. John
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (04) : 287 - 300
  • [6] Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
    Ming, Yang
    He, Baokang
    Wang, Chenhao
    IEEE ACCESS, 2021, 9 : 42593 - 42603
  • [7] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613
  • [8] Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
    Nomura, Kenta
    Mohri, Masami
    Shiraishi, Yoshiaki
    Morii, Masakatu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10) : 2420 - 2431
  • [9] Multi-authority Based Weighted Attribute Encryption Scheme in Cloud Computing
    Wang, Yun
    Zhang, Dalei
    Zhong, Hong
    2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 1033 - 1038
  • [10] A survey on multi-authority and decentralized attribute-based encryption
    Prince Silas Kwesi Oberko
    Victor-Hillary Kofi Setornyo Obeng
    Hu Xiong
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 515 - 533