Skip to main content
Erschienen in: Cluster Computing 2/2021

01.01.2021

PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems

verfasst von: Kamalakanta Sethi, Ankit Pradhan, Padmalochan Bera

Erschienen in: Cluster Computing | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Attribute-based encryption (ABE) has evolved as an efficient and secure method for storage of data with fine-grained access control in cloud platforms. In recent years, increasing diversification in the design of ABE schemes has led to significant research in the assimilation of properties like traceability, revocation, and outsourcing decryption. However, most of the recent ABE schemes incorporate few of these properties and hence lack in robustness to adapt with varying demands of cloud systems. In modern ABE designs, the notions of forward and backward secrecy have been introduced to accommodate the delegation of a large number of heterogeneous users in the system. In general, these features are realized under the concept of user revocation. On the other hand, to control malicious users in the system, it is necessary to implement traceability in integration with user revocation. Finally, for resource-constrained users, outsourcing decryption to proxy servers is a viable option. Thus, we propose PMTER-ABE, a practical decentralized multi-authority traceable and efficiently revocable attribute-based cryptosystem with outsourcing decryption advantage. The key features of our cryptosystem are (i) incorporating large attribute universe with highly expressive policies, (ii) integrating forward and backward secrecy under user revocation, (iii) implementing white-box traceability to detect malicious users, and (iv) outsourcing decryption to reduce the computational overhead of decryption on users. We present the formal proofs for correctness, security, and traceability of PMTER-ABE along with performance analysis. The efficiency and usability of PMTER-ABE is shown with practical implementation and experimental results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Ning, J., Dong, X., Cao Z.Z., Wei, L.: Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud, In: Proc. of the European Symposium on Research in Computer Security, Vienna, pp. 270–289 (2015). https://doi.org/10.1007/978-3-319-24177-7_14 Ning, J., Dong, X., Cao Z.Z., Wei, L.: Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud, In: Proc. of the European Symposium on Research in Computer Security, Vienna, pp. 270–289 (2015). https://​doi.​org/​10.​1007/​978-3-319-24177-7_​14
5.
Zurück zum Zitat Li, J., Huang, Q., Chen, X., Chow, S.S.M., Wong, D.S., Xie, D.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proc. of the 6th ACM Symposium on Information, Computer, and Communications Security, Hong Kong, pp. 386–390 (2011). https://doi.org/10.1145/1966913.1966964 Li, J., Huang, Q., Chen, X., Chow, S.S.M., Wong, D.S., Xie, D.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proc. of the 6th ACM Symposium on Information, Computer, and Communications Security, Hong Kong, pp. 386–390 (2011). https://​doi.​org/​10.​1145/​1966913.​1966964
6.
Zurück zum Zitat Zhou, J., Cao, Z., Dong, X., Lin, X.: TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In: Proceedings of the IEEE INFOCOM 2015, Hong Kong, China, pp. 2398–2406 (2015) https://doi.org/10.1109/INFOCOM.2015.7218628 Zhou, J., Cao, Z., Dong, X., Lin, X.: TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In: Proceedings of the IEEE INFOCOM 2015, Hong Kong, China, pp. 2398–2406 (2015) https://​doi.​org/​10.​1109/​INFOCOM.​2015.​7218628
12.
Zurück zum Zitat Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proc. 20th USENIX security symp., pp. 1–16. USENIX Association (2011) Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proc. 20th USENIX security symp., pp. 1–16. USENIX Association (2011)
15.
21.
Zurück zum Zitat Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute based encryption. In: Proc. of the 16th ACM Conference on Computer and Communications Security, pp. 121–130 (2009) Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute based encryption. In: Proc. of the 16th ACM Conference on Computer and Communications Security, pp. 121–130 (2009)
23.
Zurück zum Zitat Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Proc. of the 20th ACM Conference on Computer and Communications Security, Berlin, pp. 463–574 (2013). https://doi.org/10.1145/2508859.2516672 Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Proc. of the 20th ACM Conference on Computer and Communications Security, Berlin, pp. 463–574 (2013). https://​doi.​org/​10.​1145/​2508859.​2516672
24.
Zurück zum Zitat Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Böhme R., Okamoto T. (eds) Financial Cryptography and Data Security. FC 2015. Lecture Notes in Computer Science, vol. 8975. Springer, Berlin, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47854-7_19 Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Böhme R., Okamoto T. (eds) Financial Cryptography and Data Security. FC 2015. Lecture Notes in Computer Science, vol. 8975. Springer, Berlin, Heidelberg (2015). https://​doi.​org/​10.​1007/​978-3-662-47854-7_​19
25.
Zurück zum Zitat Hinek, M.J., Jiang, S., Safavi-Naini, R., Shahandashti, S.F.: Attribute-based encryption with key cloning protection. In: Cryptology ePrint Archive, Report 2008/478 (2008) Hinek, M.J., Jiang, S., Safavi-Naini, R., Shahandashti, S.F.: Attribute-based encryption with key cloning protection. In: Cryptology ePrint Archive, Report 2008/478 (2008)
28.
Zurück zum Zitat Ning, J.T., Cao, Z.F., Dong, X.L., Wei, L.: Traceable and revocable CP-ABE with shorter ciphertexts. Sci. China Inf. Sci. 59, 119102 (2016)CrossRef Ning, J.T., Cao, Z.F., Dong, X.L., Wei, L.: Traceable and revocable CP-ABE with shorter ciphertexts. Sci. China Inf. Sci. 59, 119102 (2016)CrossRef
31.
Zurück zum Zitat Ning, J., Cao, Z., Dong, X., Wei, L.: White-box traceable CP-ABE for Cloud storage service: how to catch people leaking their access credentials effectively. In: IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 5, pp. 883–897 (2018). https://doi.org/10.1109/TDSC.2016.2608343 Ning, J., Cao, Z., Dong, X., Wei, L.: White-box traceable CP-ABE for Cloud storage service: how to catch people leaking their access credentials effectively. In: IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 5, pp. 883–897 (2018). https://​doi.​org/​10.​1109/​TDSC.​2016.​2608343
39.
Zurück zum Zitat Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Advances in Cryptology, pp. 199-217. Springer-Verlag, Berlin (2012) Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Advances in Cryptology, pp. 199-217. Springer-Verlag, Berlin (2012)
44.
Zurück zum Zitat Chow, S.S.M.: A framework of multi-authority attribute-based encryption with outsourcing and revocation. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies (SACMAT’16). ACM, New York, pp. 215–226 (2016). https://doi.org/10.1145/2914642.2914659 Chow, S.S.M.: A framework of multi-authority attribute-based encryption with outsourcing and revocation. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies (SACMAT’16). ACM, New York, pp. 215–226 (2016). https://​doi.​org/​10.​1145/​2914642.​2914659
46.
Zurück zum Zitat Jiang, Z.L., Zhang, R., Liu, Z., Yiu, S., Hui, L.C., Wang, X., Fang, J.: A revocable outsourcing attribute-based encryption scheme. In: Proc. CloudComp 2016, Guangzhou, China, November 25–26, pp. 145–161. Springer-Verlag, Cham (2016) Jiang, Z.L., Zhang, R., Liu, Z., Yiu, S., Hui, L.C., Wang, X., Fang, J.: A revocable outsourcing attribute-based encryption scheme. In: Proc. CloudComp 2016, Guangzhou, China, November 25–26, pp. 145–161. Springer-Verlag, Cham (2016)
48.
Zurück zum Zitat Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. dissertation, Faculty Comput. Sci., Technion-Israel Inst. Technol., Haifa, Israel (1996) Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. dissertation, Faculty Comput. Sci., Technion-Israel Inst. Technol., Haifa, Israel (1996)
Metadaten
Titel
PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
verfasst von
Kamalakanta Sethi
Ankit Pradhan
Padmalochan Bera
Publikationsdatum
01.01.2021
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 2/2021
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-020-03202-2

Weitere Artikel der Ausgabe 2/2021

Cluster Computing 2/2021 Zur Ausgabe

Premium Partner