Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Li, Jina; b; e | Chen, Xiaofengb; e | Li, Jingweic | Jia, Chunfuc | Ma, Jianfengd | Lou, Wenjinge; *
Affiliations: [a] School of Computer Science, Guangzhou University, P.R. China | [b] State Key Laboratory of Integrated Service Networks (ISN), Xidian University, P.R. China | [c] College of Computer and Control Engineering, Nankai University, P.R. China | [d] School of Computer Science and Technology, Xidian University, P.R. China | [e] Department of Computer Science, Virginia Polytechnic Institute and State University, USA
Correspondence: [*] Corresponding author: Wenjing Lou, Department of Computer Science, Virginia Polytechnic Institute and State University, USA. Tel.: +1 703 538 3774; E-mail: wjlou@vt.edu.
Abstract: As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for outsourced data security and privacy. Attribute-based encryption (ABE) is a promising cryptographic primitive, which has been widely applied to design fine-grained access control system recently. However, ABE is criticized for its high scheme overhead as the computational cost grows with the complexity of the access formula. This disadvantage becomes more serious for mobile devices with constrained computing resources. Aiming at tackling the challenge above, we present a generic and efficient solution to implement attribute-based access control system by introducing secure outsourcing techniques into ABE. More precisely, two cloud service providers (CSPs), namely key generation-cloud service provider (KG-CSP) and decryption-cloud service provider (D-CSP) are introduced to perform the outsourced key-issuing and decryption on behalf of attribute authority and users respectively. In order to outsource heavy computation to both CSPs without private information leakage, we formalize an underlying primitive called outsourced ABE (OABE) and propose several constructions with outsourced decryption and key-issuing. Finally, extensive experiment demonstrates that with the help of KG-CSP and D-CSP, efficient key-issuing and decryption are achieved in our constructions.
Keywords: Attribute-based encryption, access control, outsourcing computation, cloud computing
DOI: 10.3233/JCS-150533
Journal: Journal of Computer Security, vol. 23, no. 6, pp. 659-683, 2015
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl