Back to Search Start Over

Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.

Authors :
Ning, Jianting
Cao, Zhenfu
Dong, Xiaolei
Liang, Kaitai
Ma, Hui
Wei, Lifei
Source :
IEEE Transactions on Information Forensics & Security; Jan2018, Vol. 13 Issue 1, p94-105, 12p
Publication Year :
2018

Abstract

As a sophisticated mechanism for secure fine-grained access control over encrypted data, ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising candidates for cloud computing applications. However, there exist two main long-lasting open problems of CP-ABE that may limit its wide deployment in commercial applications. One is that decryption yields expensive pairing cost which often grows with the increase of access policy size. The other is that one is granted access privilege for unlimited times as long as his attribute set satisfies the access policy of a given ciphertext. Such powerful access rights, which are provided by CP-ABE, may be undesirable in real-world applications (e.g., pay-as-you-use). To address the above drawbacks, in this paper, we propose a new notion called auditable $\sigma $ -time outsourced CP-ABE, which is believed to be applicable to cloud computing. In our notion, expensive pairing operation incurred by decryption is offloaded to cloud and meanwhile, the correctness of the operation can be audited efficiently. Moreover, the notion provides $\sigma $ -time fine-grained access control. The cloud service provider may limit a particular set of users to enjoy access privilege for at most $\sigma $ times within a specified period. As of independent interest, the notion also captures key-leakage resistance. The leakage of a user’s decryption key does not help a malicious third party in decrypting the ciphertexts belonging to the user. We design a concrete construction (satisfying our notion) in the key encapsulation mechanism setting based on Rouselakis and Waters (prime order) CP-ABE, and further present security and extensive experimental analysis to highlight the scalability and efficiency of our construction. [ABSTRACT FROM PUBLISHER]

Details

Language :
English
ISSN :
15566013
Volume :
13
Issue :
1
Database :
Complementary Index
Journal :
IEEE Transactions on Information Forensics & Security
Publication Type :
Academic Journal
Accession number :
126323282
Full Text :
https://doi.org/10.1109/TIFS.2017.2738601