Batch Attribute-Based Encryption for Secure Clouds

被引:4
|
作者
Yang, Chen [1 ]
Sun, Yang [2 ]
Wu, Qianhong [2 ]
机构
[1] China Informat Secur Res Inst, Beijing 100085, Peoples R China
[2] Beihang Univ, Sch Elect & Informat Engn, XueYuan Rd 37, Beijing 100191, Peoples R China
基金
北京市自然科学基金;
关键词
data privacy; access control; cloud storage; batch attribute-based encryption;
D O I
10.3390/info6040704
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE) is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only if the associated attributes match the predetermined access policy, which allows one to enforce fine-grained access control on outsourced files. One issue in existing ABE schemes is that they are designed for the users of a single organization. When one wants to share the data with the users of different organizations, the owner needs to encrypt the messages to the receivers of one organization and then repeats this process for another organization. This situation is deteriorated with more and more mobile devices using cloud services, as the ABE encryption process is time consuming and may exhaust the power supplies of the mobile devices quickly. In this paper, we propose a batch attribute-based encryption (BABE) approach to address this problem in a provably-secure way. With our approach, the data owner can outsource data in batches to the users of different organizations simultaneously. The data owner is allowed to decide the receiving organizations and the attributes required for decryption. Theoretical and experimental analyses show that our approach is more efficient than traditional encryption implementations in computation and communication.
引用
收藏
页码:704 / 718
页数:15
相关论文
共 50 条
  • [21] Secure access privilege delegation using attribute-based encryption
    Suryakanta Panda
    Samrat Mondal
    Ashok Kumar Das
    Willy Susilo
    [J]. International Journal of Information Security, 2023, 22 : 1261 - 1276
  • [22] Fully Secure Online/Offline Predicate and Attribute-Based Encryption
    Datta, Pratish
    Dutta, Ratna
    Mukhopadhyay, Sourav
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 331 - 345
  • [23] Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption
    Zuo, Cong
    Shao, Jun
    Wei, Guiyi
    Xie, Mande
    Ji, Min
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 495 - 508
  • [24] Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense
    Mao, Yijun
    Zhang, Yue
    Chen, Min-Rong
    Li, Yongbiao
    Zhan, Yiju
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (03): : 397 - 403
  • [25] Adaptively secure outsourcing ciphertext-policy attribute-based encryption
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    Wang, Yilei
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2270 - 2280
  • [26] Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things
    Tran Viet Xuan Phuong
    Ning, Rui
    Xin, Chunsheng
    Wu, Hongyi
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1511 - 1519
  • [27] Secure Zones: an Attribute-Based Encryption Advisory System for Safe Firearms
    Portnoi, Marcos
    Shen, Chien-Chung
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 397 - 398
  • [28] Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption
    Kitagawa, Takashi
    Kojima, Hiroki
    Attrapadung, Nuttapong
    Imai, Hideki
    [J]. INFORMATION SECURITY (ISC 2013), 2015, 7807 : 87 - 99
  • [29] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 545 - 554
  • [30] A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption
    Yang, Tonghao
    Li, Junquan
    Yu, Bin
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015