Traceable CP-ABE for Outsourced Big Data in Cloud Storage

Ciphertext Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic solution for the unauthorized access to the outsourced big data in the cloud environment. However, most of the existing CP-ABE schemes do not have the provision to trace the users who misuse their secret key for profit intention which indeed reduces the CP-ABE schemes security. Thus, in this paper, we propose traceable CP-ABE (T-CP-ABE) for outsourced big data in cloud storage. Our scheme has the provision to dynamically trace who is decrypting the ciphertext during outsourced proxy decryption, which helps to identify the malicious users who misuse their secret key for profit intention. Furthermore, our scheme has an efficient key sanity check, which ensures that only the well-formed secret key is used for decryption. Security analysis proves that our scheme resist against the secret key forging and chosen-plaintext attacks. Performance evaluation proves that our T-CP-ABE scheme is efficient than other traceability schemes.

[1]  Syam Kumar Pasupuleti,et al.  A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud , 2018, Journal of Ambient Intelligence and Humanized Computing.

[2]  Xiaolei Dong,et al.  Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud , 2015, ESORICS.

[3]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[4]  Kim-Kwang Raymond Choo,et al.  Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment , 2017, Comput. Stand. Interfaces.

[5]  Yang Xiang,et al.  Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing , 2017, IEEE Transactions on Cloud Computing.

[6]  Dongqing Xie,et al.  Multi-authority ciphertext-policy attribute-based encryption with accountability , 2011, ASIACCS '11.

[7]  Xiaohui Liang,et al.  EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid , 2014, IEEE Transactions on Parallel and Distributed Systems.

[8]  P. Praveen Kumar,et al.  An Efficient Ciphertext Policy-Attribute Based Encryption for Big Data Access Control in Cloud Computing , 2017, 2017 Ninth International Conference on Advanced Computing (ICoAC).

[9]  Zhou Su,et al.  An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy , 2017, IEEE Internet of Things Journal.

[10]  Kai Zhang,et al.  Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability , 2017, Science China Information Sciences.

[11]  Jin Li,et al.  Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..

[12]  Fuchun Guo,et al.  Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes , 2018, Inf. Sci..

[13]  Xiaolei Dong,et al.  CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage , 2018, IEEE Transactions on Services Computing.

[14]  Hongbo Zhu,et al.  Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud , 2018, Wirel. Commun. Mob. Comput..

[15]  Zoe L. Jiang,et al.  Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating , 2018, J. Netw. Comput. Appl..

[16]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[17]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[18]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[19]  Jin Li,et al.  Efficient attribute-based data sharing in mobile clouds , 2016, Pervasive Mob. Comput..

[20]  Xiaolei Dong,et al.  White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[22]  Jian Shen,et al.  User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage , 2018, IEEE Systems Journal.

[23]  Jing Li,et al.  Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption , 2017, Soft Computing.

[24]  Xiaolei Dong,et al.  Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability , 2014, ESORICS.

[25]  Zhen Liu,et al.  White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures , 2013, IEEE Transactions on Information Forensics and Security.

[26]  Fuchun Guo,et al.  Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts , 2017, International Journal of Information Security.

[27]  Jin Li,et al.  A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control , 2009, IACR Cryptol. ePrint Arch..

[28]  Bo Gao,et al.  Fog Computing-Assisted Energy-Efficient Resource Allocation for High-Mobility MIMO-OFDMA Networks , 2018, Wirel. Commun. Mob. Comput..

[29]  Xiaolei Dong,et al.  White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively , 2018, IEEE Transactions on Dependable and Secure Computing.

[30]  Tianlong Gu,et al.  A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram , 2017, IEEE Access.

[31]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.