A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation

  • PDF / 1,900,275 Bytes
  • 18 Pages / 439.37 x 666.142 pts Page_size
  • 34 Downloads / 131 Views

DOWNLOAD

REPORT


A Flexible KP‑ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation Shuo Zhang1   · Wenmin Li1 · Qiaoyan Wen1 · Hua Zhang1 · Zhengping Jin1

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Attribute based encryption is an effective method which can solve the access control problem of cloud storage. Realizing both efficient attributes revocation and outsourcing decryption would enhance mobile user experience. In this paper, we present a new scheme of Key-Policy Attribute Based Encryption in hybrid cloud system. In our scheme, the most of computation in the decryption process can be outsourced to the cloud and the efficiency of system is improved. In addition, the attributes of malicious users or expired ones can be revoked with unrelated users offline. Moreover system consumes a little resources rather than rebuilds the system or updates all data immediately. We also give a proof of security, a detailed description of execution and efficiency analysis. Keywords  Attribute-based encryption · Decryption outsourcing · Attribute revocation

1 Introduction As the number of cloud services increases rapidly, People’s lives depend more on cloud services. The usage of cloud storage makes people’s life more efficient and comfort. For example people share personal pictures and videos with their friends through Internet now. When people enjoy themselves through modern technology, they are in the face of more threats. The privacy data such as family photos or a personal video may be touched by ones not welcomed. Even some extreme privacy information such as medical information is * Shuo Zhang [email protected] Wenmin Li [email protected] Qiaoyan Wen [email protected] Hua Zhang [email protected] Zhengping Jin [email protected] 1



State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China

13

Vol.:(0123456789)



S. Zhang et al.

stored in a public cloud server. How to guarantee people’s data security has been discussed by numerous researchers. Adversaries try to attack the cloud servers to obtain useful information. As an effective method to prevent malicious people, a strict access control scheme should be used in cloud. One of the most common methods for this problem is to store the data in encrypted form. A simple encryption can keep the information secure but hinder people to share special information to other people or a special group. However a more detail access control helps people achieve both security and practicability. In some specific application scenarios, a more complex and flexible scheme is needed. For example the medical information of a patient should be shared with his or her doctors. And the internal medicine can not be shown to the surgery doctors if not necessary. An attribute-based encryption works in such situation. Sahai and Waters [13] put forward the concept of Attribute-Based Encryption(ABE). In ABE system, users’ keys and ciphertexts are labeled with