期刊文献+

支持恶意用户追踪的属性基云数据共享方案 被引量:5

Tracing Malicious Insider in Attribute-Based Cloud Data Sharing
下载PDF
导出
摘要 云存储服务为互联网用户提供了更加灵活、可扩展的外包数据访问,获得学术界和工业界的关注.为防止用户数据被泄露到开放的网络中,数据所有者往往选择先将数据加密再上传到云存储服务器.与传统加密方式相比,属性基加密为云端加密数据提供更细粒度的数据访问控制机制,可实现“一对多”的访问策略模式.然而,传统属性基加密系统不具备同时“追踪”泄露解密密钥以及制造解密黑盒恶意用户的能力.本文重点研究在云存储服务的数据共享机制中部署密文策略属性基加密时出现的解密权限泄露问题.本文将白盒可追踪性和黑盒可追踪性作为一个整体集成到传统的密文策略属性基加密中,并提供两种追踪机制:白盒追踪机制和黑盒追踪机制.若泄露的解密权限为解密密钥,则可利用白盒追踪;若泄露的解密权限为解密设备,则需要利用黑盒追踪.本文所提出系统的主要特点包括:(1)云共享数据的授权访问.数据所有者的文件被加密并存储到云服务器上,满足指定访问策略的授权用户才能访问文件;(2)白盒可追踪性.若恶意内部人员故意泄露其解密密钥,则可基于白盒追踪机制执行追踪;(3)黑盒可追踪性.若泄露解密设备并被发现,则可通过黑盒追踪机制捕获共同构造该设备的恶意内部人员;(4)公开追踪性.白盒追踪算法是公开的,任何人都能运行该追踪算法而无需额外的秘密信息;(5)轻量级追踪代价.在白/黑盒追踪机制中,系统不需要额外增加与用户秘密信息相关的公共参数,且整个系统的公共参数与用户数量无关,这使得系统更为实用.本文所构造的方案既保证了对云加密共享数据的细粒度访问控制,又保证了对“泄露”解密权限的可追踪性.最后,安全分析和性能评估验证了本文所提出方案的安全性和效率. Providing more flexibility and scalability on outsourced data access for Internet users,cloud-based storage service has drawn increasing interest from academia and industry.To protect user data from being leaked to an open network,end-to-end encryption technique may be leveraged.Compared to traditional encryption(e.g.,AES and RSA),a new cryptographic primitive called attribute-based encryption offers more fine-grained level on data sharing(one-to-many mode via access policy)which may be considered as a highly promising cloud-based data access control.However,traditional ciphertext-policy attribute-based encryption systems may not“catch”any malicious insiders who are keen to“leak”decryption privilege to an unauthorized party.In this paper,we investigate the decryption privilege leakage problem when deploying ciphertext-policy attribute-based encryption in data sharing mechanism for cloud storage service.We integrate white-box and black-box traceability as a whole into conventional ciphertext-policy attribute-based encryption,and two types of tracing(i.e.,white-box and black-box tracing mechanisms)are provided in our proposed system.In particular,if the leaked decryption privilege is advertised to be a decryption key,one may make use of the white-box tracing;but if the decryption privilege is in the form of a decryption device,the black-box tracing shall be leveraged.The main features of our proposed system include(1)Authorized access over shared data in the cloud.A data owner’s files are encrypted and stored in a cloud server,and only authorized cloud users satisfying a specified access policy can gain access to the files;(2)White-box Traceability.If a malicious insider deliberately leaks his decryption key and the key is found,the traitor who leaks the key will be traced by the white-box tracing mechanism;(3)Black-box Traceability.If a decryption device is leaked and found,the malicious insiders who jointly build the device can be caught with the black-box tracing mechanism;(4)Public tracing.The white-box tracing algorithm is public in the sense that anyone can run it without the need of“extra”secret information;and(5)Almost-no-storage for traceability.The proposed system does not need additional public parameters which are related to each of the user’s secret information in white/black-box traceability.The public parameters of the whole system are independent of the number of users,which makes the system more practical.Our novel construction guarantees fine-grained access control over cloud-based encrypted data but also the traceability of“leaked”decryption privilege.The security analysis and performance evaluation outline the security and efficiency of the construction.
作者 宁建廷 黄欣沂 魏立斐 马金花 荣静 NING Jian-Ting;HUANG Xin-Yi;WEI Li-Fei;MA Jin-Hua;RONG Jing(College of Computer and Cyber Security,Fujian Normal University,Fuzhou 350117;Information School,Shanghai Ocean University,Shanghai 201306;Guangling College,Yangzhou University,Yangzhou,Jiangsu 225009;State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093)
出处 《计算机学报》 EI CAS CSCD 北大核心 2022年第7期1431-1445,共15页 Chinese Journal of Computers
基金 国家自然科学基金项目(62032005,61972094,61872087,61972241) 福建省自然科学基金项目(2020J02016) 福建省科协第二届青年人才托举工程资助。
关键词 云数据共享 密文策略属性基加密 可追踪性 解密权限滥用 数据访问控制 cloud data sharing ciphertext-policy attribute-based encryption traceability misuse of decryption privilege data access control
  • 相关文献

参考文献6

二级参考文献16

  • 1Liu Z, Cao Z F, Wong D C S. White-box traceable ciphertext-policy attribute-based encryption support- ing any monotone access structures. IEEE Trans Inf Foren Secur, 2013, 8:76- 88.
  • 2Ning J T, Cao Z F, Dong X L, et al. Large universe ciphertext-policy attribute-based encryption with white-box traceability. In: Computer Security- ESORICS 2014. Berlin: SDriner. 2014. 55-72.
  • 3Ning J T, Dong X L, Cao Z F, et al. Account- able authority ciphertext-policy attribute-based en- cryption with white-box traceability and public au- diting in the cloud. In: Computer Security-ESORICS 2015. Berlin: Springer, 2015. 270- 289.
  • 4Ning J T, Dong X L, Cao Z F, et al. White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans Inf Foren Secur, 2015, 10:1274-1288.
  • 5Liu Z, Cao Z F, Wong D C S. Traceable cp-abe: how to trace decryption devices found in the wild. IEEE Trails Inf Foren Secur, 2015, 10:55-68.
  • 6Liu Z, Cao Z F, Wong D C S. Blackbox traceable cp- abe: how to catch people leaking their keys by selling decryption devices on ebay. In: Proceedings of the ACM SIGSAC Conference on Computer and Commu- nications Security. New York: ACM, 2013. 475 -486.
  • 7Garg S, Kumarasubramanian A, Sahai A, et al. Build- ing efficient fully collusion-resilient traitor tracing and revocation schemes. In: Proceedings of the 17th ACM Conference on Computer and Communications Secu- rity. New York: ACM, 2010. 121-130.
  • 8WANG YongTao,CHEN KeFei,LONG Yu,LIU ZhaoHui.Accountable authority key policy attribute-based encryption[J].Science China(Information Sciences),2012,55(7):1631-1638. 被引量:6
  • 9XU Peng,TANG Yong,JIANG Wenbin,JIN Hai,ZOU Deqing.Ciphertext-Policy Attribute-Based Encryption with Short Keys[J].Chinese Journal of Electronics,2014,23(4):655-660. 被引量:5
  • 10孙奕,陈性元,杜学绘,陈亮,徐建.一种用于流交换的代理重签名方案[J].软件学报,2015,26(1):129-144. 被引量:6

共引文献41

同被引文献56

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部