A fully distributed hierarchical attribute-based encryption scheme
With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and fine-grained data access control, attribute-based encryption (ABE) was proposed and...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5148 https://ink.library.smu.edu.sg/context/sis_research/article/6151/viewcontent/Fully_dist_HABES_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-6151 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-61512020-07-09T04:28:32Z A fully distributed hierarchical attribute-based encryption scheme Ali Mohammad, MOHAJERI, Javad LIU, Ximeng LIU, Ximeng With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and fine-grained data access control, attribute-based encryption (ABE) was proposed and used in several cloud storage systems. However, scalability and flexibility in key delegation and user revocation mechanisms are primary issues in ABE systems. In this paper, we introduce the concept of a fully distributed revocable ciphertext-policy hierarchical ABE (FDR-CP-HABE) and design the first FDR-CP-HABE scheme. Our scheme offers a high level of flexibility and scalability in the key delegation and user revocation phases. Moreover, our scheme is efficient and provides lightweight computation in the decryption phase. Indeed, by exploiting a computation outsourcing technique, most of the operations are executed by the powerful cloud server, and very few computations are left to the users. Also, the storage cost on the user side is significantly decreased as compared to similar schemes. Furthermore, using the hardness assumption of DBDH problem, we prove that our scheme is adaptively secure in the standard model. Our security analyses and implementation results indicate that our scheme is efficient, secure, and scalable. (C) 2020 Elsevier B.V. All rights reserved. 2020-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5148 info:doi/10.1016/j.tcs.2020.02.030 https://ink.library.smu.edu.sg/context/sis_research/article/6151/viewcontent/Fully_dist_HABES_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Cloud computing Hierarchical attribute-based encryption Ciphertext-policy attribute-based encryption Access control Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Cloud computing Hierarchical attribute-based encryption Ciphertext-policy attribute-based encryption Access control Information Security |
spellingShingle |
Cloud computing Hierarchical attribute-based encryption Ciphertext-policy attribute-based encryption Access control Information Security Ali Mohammad, MOHAJERI, Javad LIU, Ximeng LIU, Ximeng A fully distributed hierarchical attribute-based encryption scheme |
description |
With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and fine-grained data access control, attribute-based encryption (ABE) was proposed and used in several cloud storage systems. However, scalability and flexibility in key delegation and user revocation mechanisms are primary issues in ABE systems. In this paper, we introduce the concept of a fully distributed revocable ciphertext-policy hierarchical ABE (FDR-CP-HABE) and design the first FDR-CP-HABE scheme. Our scheme offers a high level of flexibility and scalability in the key delegation and user revocation phases. Moreover, our scheme is efficient and provides lightweight computation in the decryption phase. Indeed, by exploiting a computation outsourcing technique, most of the operations are executed by the powerful cloud server, and very few computations are left to the users. Also, the storage cost on the user side is significantly decreased as compared to similar schemes. Furthermore, using the hardness assumption of DBDH problem, we prove that our scheme is adaptively secure in the standard model. Our security analyses and implementation results indicate that our scheme is efficient, secure, and scalable. (C) 2020 Elsevier B.V. All rights reserved. |
format |
text |
author |
Ali Mohammad, MOHAJERI, Javad LIU, Ximeng LIU, Ximeng |
author_facet |
Ali Mohammad, MOHAJERI, Javad LIU, Ximeng LIU, Ximeng |
author_sort |
Ali Mohammad, |
title |
A fully distributed hierarchical attribute-based encryption scheme |
title_short |
A fully distributed hierarchical attribute-based encryption scheme |
title_full |
A fully distributed hierarchical attribute-based encryption scheme |
title_fullStr |
A fully distributed hierarchical attribute-based encryption scheme |
title_full_unstemmed |
A fully distributed hierarchical attribute-based encryption scheme |
title_sort |
fully distributed hierarchical attribute-based encryption scheme |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2020 |
url |
https://ink.library.smu.edu.sg/sis_research/5148 https://ink.library.smu.edu.sg/context/sis_research/article/6151/viewcontent/Fully_dist_HABES_av.pdf |
_version_ |
1770575295289491456 |