Attribute-Based Hierarchical Access Control With Extendable Policy

被引:15
|
作者
Xiao, Meiyan [1 ]
Li, Hongbo [1 ]
Huang, Qiong [1 ,2 ]
Yu, Shui [3 ]
Susilo, Willy [4 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Peoples R China
[2] Guangzhou Key Lab Intelligent Agr, Guangzhou 510642, Peoples R China
[3] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW 2007, Australia
[4] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2500, Australia
基金
中国国家自然科学基金;
关键词
Encryption; Access control; Cloud computing; Task analysis; Software; Periodic structures; Logic gates; Attribute-based encryption; hierarchical access control; extendable policy; ENCRYPTION; SCHEME; UPDATE;
D O I
10.1109/TIFS.2022.3173412
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-based encryption scheme is a promising mechanism to realize one-to-many fine-grained access control which strengthens the security in cloud computing. However, massive amounts of data and various data sharing requirements bring great challenges to the complex but isolated and fixed access structures in most of the existing attribute-based encryption schemes. In this paper, we propose an attribute-based hierarchical encryption scheme with extendable policy, called Extendable Hierarchical Ciphertext-Policy Attribute-Based Encryption (EH-CP-ABE), to improve the data sharing efficiency and security simultaneously. The scheme realizes the function of hierarchical encryption, in which, data with hierarchical access control relationships could be encrypted together flexibly to improve the efficiency. The scheme also achieves external and internal extension of the access structure to further encrypt newly added hierarchical data without updating the original ciphertexts or with only a minor update depending on the data sharing requirements, which simplifies the encryption process and greatly reduces the computation overhead. We formally prove the security of the scheme is IND-CCA secure in the random oracle model based on bilinear Diffie-Hellman assumption, and we also implement our scheme to demonstrate its efficiency and practicality.
引用
收藏
页码:1868 / 1883
页数:16
相关论文
共 50 条
  • [21] Mining Positive and Negative Attribute-Based Access Control Policy Rules
    Iyer, Padmavathi
    Masoumzadeh, Amirreza
    [J]. SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 161 - 172
  • [22] Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control
    Servos, Daniel
    Bauer, Michael
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 242 - 260
  • [23] An Attribute-Based Access Control Policy Retrieval Method Based on Binary Sequence
    Pan, Ruijie
    Wang, Gaocai
    Wu, Man
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [24] An efficient attribute-based hierarchical data access control scheme in cloud computing
    He, Heng
    Zheng, Liang-han
    Li, Peng
    Deng, Li
    Huang, Li
    Chen, Xiang
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [25] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing
    Liu, Xuejiao
    Xia, Yingjie
    Jiang, Shasha
    Xia, Fubiao
    Wang, Yanbo
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
  • [26] An ontology-based approach to improve access policy administration of attribute-based access control
    Li J.
    Zhang B.
    [J]. International Journal of Information and Computer Security, 2019, 11 (4-5): : 391 - 412
  • [27] ATTRIBUTE-BASED ACCESS CONTROL POLICY GENERATION APPROACH FROM ACCESS LOGS BASED ON THE CATBOOST
    Quan, Shan
    Zhao, Yongdan
    Helil, Nurmamat
    [J]. COMPUTING AND INFORMATICS, 2023, 42 (03) : 615 - 650
  • [28] Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption
    Asim, Muhammad
    Ignatenko, Tanya
    Petkovic, Milan
    Trivellato, Daniel
    Zannone, Nicola
    [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 212 - 217
  • [29] Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data
    Liu, Ximeng
    Ma, Jianfeng
    Xiong, Jinbo
    Liu, Guangjun
    [J]. International Journal of Network Security, 2014, 16 (06) : 437 - 443
  • [30] In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control
    Heutelbeck, Dominic
    Baur, Marc Lucas
    Kluba, Martin
    [J]. PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 59 - 70