Attribute-Based Hierarchical Access Control With Extendable Policy

被引:15
|
作者
Xiao, Meiyan [1 ]
Li, Hongbo [1 ]
Huang, Qiong [1 ,2 ]
Yu, Shui [3 ]
Susilo, Willy [4 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Peoples R China
[2] Guangzhou Key Lab Intelligent Agr, Guangzhou 510642, Peoples R China
[3] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW 2007, Australia
[4] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2500, Australia
基金
中国国家自然科学基金;
关键词
Encryption; Access control; Cloud computing; Task analysis; Software; Periodic structures; Logic gates; Attribute-based encryption; hierarchical access control; extendable policy; ENCRYPTION; SCHEME; UPDATE;
D O I
10.1109/TIFS.2022.3173412
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-based encryption scheme is a promising mechanism to realize one-to-many fine-grained access control which strengthens the security in cloud computing. However, massive amounts of data and various data sharing requirements bring great challenges to the complex but isolated and fixed access structures in most of the existing attribute-based encryption schemes. In this paper, we propose an attribute-based hierarchical encryption scheme with extendable policy, called Extendable Hierarchical Ciphertext-Policy Attribute-Based Encryption (EH-CP-ABE), to improve the data sharing efficiency and security simultaneously. The scheme realizes the function of hierarchical encryption, in which, data with hierarchical access control relationships could be encrypted together flexibly to improve the efficiency. The scheme also achieves external and internal extension of the access structure to further encrypt newly added hierarchical data without updating the original ciphertexts or with only a minor update depending on the data sharing requirements, which simplifies the encryption process and greatly reduces the computation overhead. We formally prove the security of the scheme is IND-CCA secure in the random oracle model based on bilinear Diffie-Hellman assumption, and we also implement our scheme to demonstrate its efficiency and practicality.
引用
收藏
页码:1868 / 1883
页数:16
相关论文
共 50 条
  • [31] PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework
    LeMay, Michael
    Fatemieh, Omid
    Gunter, Carl A.
    [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 205 - 214
  • [32] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [33] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [34] Policy Adaptation in Attribute-Based Access Control for Inter-organizational Collaboration
    Das, Saptarshi
    Sural, Sharnik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 136 - 145
  • [35] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [36] ABACaaS: Attribute-Based Access Control as a Service
    Meshram, Augustee
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
  • [37] Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates
    Decat, Maarten
    Moeys, Jasper
    Lagaisse, Bert
    Joosen, Wouter
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 196 - 210
  • [38] Combining Mandatory and Attribute-based Access Control
    Kerr, Lawrence
    Alves-Foss, Jim
    [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2616 - 2623
  • [39] A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability
    Lin, Guofeng
    You, Lirong
    Hui, Bing
    Hong, Hanshu
    Su, Zhixin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04): : 1832 - 1853
  • [40] A contextual attribute-based access control model
    Covington, Michael J.
    Sastry, Manoj R.
    [J]. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, 2006, 4278 : 1996 - 2006