Abstract
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising technique to enable fine-grained access control for data storage and sharing. In CP-ABE, data are encrypted with an access policy on attributes, so the frequent policy updating has always been a challenging issue for data owners. A trivial method is to let data owners retrieve the data and re-encrypt it under the new access policy, and then send it back to the server. However, this method incurs high communication and computation overhead on data owners. In this paper, we propose OE-CP-ABE scheme to implement fine-grained access control with efficient policy updating in data sharing. By combining the large universe CP-ABE with techniques of over-encryption and multi-linear secret sharing, our method can avoid the transmission of ciphertext and reduce the computation cost of data owners. The analysis shows that the proposed scheme can not only protect the confidentiality of the outsourced data, but also implement policy updating easily and efficiently.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April, DBLP, pp. 261–270 (2010)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.1007/11426639_27
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October–3 November 2006, pp. 89–98 (2006)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, vol. 2008, pp. 321–334. IEEE Computer Society (2007)
Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: ACM Sigsac Conference on Computer and Communications Security, pp. 463–474. ACM (2013)
Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Cryptology Conference on Advances in Cryptology, pp. 199–217 (2012)
Yang, K., Jia, X., Ren, K., Xie, R.: Enabling efficient access control with dynamic policy updating for big data in the cloud. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, pp. 2013–2021. IEEE (2014)
Ying, Z., Li, H., Ma, J., Zhang, J., Cui, J.: Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating. Sci. China Inf. Sci. 59, 1–16 (2016)
Yuan, W.: Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption (2016), http://eprint.iacr.org/2016/457.pdf
Shimizu, H., Kakimoto, Y., Sano, I.: Over-encryption: management of access control evolution on outsourced data. In: International Conference on Very Large DataBases, vol. 299, pp. 123–134 (2007)
Liu, S., Li, W., Wang, L.: Towards efficient over-encryption in outsourced databases using secret sharing. In: New Technologies, Mobility and Security, pp. 1–5. IEEE (2008)
Wang, X., Zhang, Y.: A dynamic access control scheme for outsourced database. In: International Conference on Network Computing and Information Security, vol. 1, pp. 3–7. IEEE Computer Society (2011)
Beimel, A.: Secure schemes for secret sharing and key distribution. Int. J. Pure Appl. Math. (1996)
Beimel, A.: Secret-sharing schemes: a survey. In: Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) IWCC 2011. LNCS, vol. 6639, pp. 11–46. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20901-7_2
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Hao, J., Liu, J., Rong, H., Wang, H., Xian, M. (2017). OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-64701-2_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64700-5
Online ISBN: 978-3-319-64701-2
eBook Packages: Computer ScienceComputer Science (R0)