White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

被引:83
|
作者
Ning, Jianting [1 ]
Cao, Zhenfu [2 ]
Dong, Xiaolei [2 ]
Wei, Lifei [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[3] Shanghai Ocean Univ, Coll Informat Technol, Shanghai 201306, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
Ciphertext-policy attribute-based encryption; cloud storage; outsourced data security; white-box traceablity; commitment; ATTRIBUTE-BASED ENCRYPTION; SECURE; SIGNATURES;
D O I
10.1109/TDSC.2016.2608343
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) has been proposed to enable fine-grained access control on encrypted data for cloud storage service. In the context of CP-ABE, since the decryption privilege is shared by multiple users who have the same attributes, it is difficult to identify the original key owner when given an exposed key. This leaves the malicious cloud users a chance to leak their access credentials to outsourced data in clouds for profits without the risk of being caught, which severely damages data security. To address this problem, we add the property of traceability to the conventional CP-ABE. To catch people leaking their access credentials to outsourced data in clouds for profits effectively, in this paper, we first propose two kinds of non-interactive commitments for traitor tracing. Then we present a fully secure traceable CP-ABE system for cloud storage service from the proposed commitment. Our proposed commitments for traitor tracing may be of independent interest, as they are both pairing-friendly and homomorphic. We also provide extensive experimental results to confirm the feasibility and efficiency of the proposed solution.
引用
收藏
页码:883 / 897
页数:15
相关论文
共 17 条
  • [1] Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage
    Qiao, Huidong
    Ba, Haihe
    Zhou, Huaizhe
    Wang, Zhiying
    Ren, Jiangchun
    Hu, Ying
    SYMMETRY-BASEL, 2018, 10 (10):
  • [2] The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability
    Li Cong
    Yang Xiaoyuan
    Liu Yazhou
    Wang Xu'an
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 707 - 719
  • [3] CP-ABE Based Access Control for Cloud Storage
    Wang, Yong
    Wei, Longxing
    Tong, Xuemin
    Zhao, Xiaolin
    Li, Ming
    INFORMATION TECHNOLOGY AND INTELLIGENT TRANSPORTATION SYSTEMS, VOL 2, 2017, 455 : 463 - 472
  • [4] Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Gong, Junqing
    Chen, Jie
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 551 - 569
  • [5] Dynamic traceable CP-ABE with revocation for outsourced big data in cloud storage
    Premkamal, Praveen Kumar
    Pasupuleti, Syam Kumar
    Alphonse, P. J. A.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (02)
  • [6] An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage
    He, Xu
    Li, Lixiang
    Peng, Haipeng
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 136
  • [7] A Hierarchical CP-ABE Scheme With Traceable Fine-Grained User Revocation for Cloud Storage
    Yang, Xiaohui
    Tao, Ya'nan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2025, 19 (01)
  • [8] A multi Ability CP-ABE access control scheme for public cloud storage
    Deepthi, Kothapalli Chaitanya
    Ashok, Dasari
    Krishna, M.
    INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [9] CP-ABE Based Access Control for Cloud Storage with Rich Policy Support
    Wang, Yong
    Wei, Long-xing
    Hu, Chang-zhen
    Zhao, Xiao-lin
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ENGINEERING (ACSE 2014), 2014, : 18 - 24
  • [10] Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud
    Yu, Gang
    Ma, Xiaoxiao
    Cao, Zhenfu
    Zeng, Guang
    Han, Wenbao
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 705 - 723