A Novel File Hierarchy Access Control Scheme Using Attribute-Based Encryption

Article Preview

Abstract:

Attribute-based encryption (ABE) can keep data privacy and realize fine-grained access control. However, the notion of file hierarchy hasn't been presented until now. The problem, the multiple hierarchical files to be shared only using once encryption scheme, cannot be effectively solved. Based on the access structure layered model, a novel access control scheme about file hierarchy is proposed by using ABE to solve the problem. The proposed scheme will not only decrease the number of access structures to one, but also only require a secret key to decrypt all the authorization files. It is proved to be secure against the chosen-plaintext attack (CPA) under the decision bilinear Diffie-Hellman (DBDH) assumption. In addition, the performance analysis results indicate that the proposed scheme is efficient and practical when a large number of hierarchical files are shared.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

911-918

Citation:

Online since:

December 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] V. Goyal, O. Pandey, A. Sahai and B. Waters. In Proceedings of the 13th ACM conference on Computer and communications security (2006), pp.89-98.

Google Scholar

[2] J. Bethencourt, A. Sahai and B. Waters. In IEEE Symposium on Security and Privacy, 2007, pp.321-334.

Google Scholar

[3] C. Gentry and A. Silverberg. In: Y. Zheng (Ed. ), ASIACRYPT, Vol. 2501 of Lecture Notes in Computer Science, Springer (2002), pp.548-566.

Google Scholar

[4] D. Boneh, X. Boyen and E. Goh. In: EUROCRYPT 2005, Vol. 3493 of Lecture Notes in Computer Science, Springer-Verlag (2005), pp.440-456.

DOI: 10.1007/11426639_26

Google Scholar

[5] C. Gentry and S. Halevi. In: O. Reingold (Ed. ), TCC, Vol. 5444 of Lecture Notes in Computer Science, Springer (2009), pp.437-456.

Google Scholar

[6] A. Lewko and B. Waters. In: K. G. Paterson (Ed. ), EUROCRYPT, Vol. 6632 of Lecture Notes in Computer Science, Springer (2011), pp.547-567.

Google Scholar

[7] X. Zhao and H. Li. Security and Communication Networks (2013).

Google Scholar

[8] G. Wang, Q. Liu and J. Wu. In Proceedings of the 17th ACM conference on Computer and communications security (2010), pp.735-737.

Google Scholar

[9] Z. Wan, J. Liu and R H. Deng. In IEEE Transactions on Information Forensics and Security (2012), pp.743-754.

Google Scholar

[10] P. Korde, V. Panwar and S. Kalse. International Journal of Engineering and advanced Technology (2013), p, 95-97.

Google Scholar

[11] M. G. Mariammal, N. U. Maheswari, R. Venkatesh and M. P. Lakshmanan. International Journal of Engineering and Computer Science (2013), p, 986-990.

Google Scholar

[12] P C. Muthu and K. Seenivasan. International Journal of Engineering research Technology (2013), pp.1406-1411.

Google Scholar

[13] X. Zou. Wuhan University Journal of Natural Sciences (2013), pp.259-264.

Google Scholar

[14] Standing Committee of the National People's Congress, Law on Guarding State Secrets, promulgated 1988 and effective (1989).

Google Scholar

[15] Translation per Human Rights in China, State Secrets: China's Legal Labyrinth, (2007).

Google Scholar

[16] B. Waters. In Proceedings of the 4th International Conference on Practice and Theory in Public Key Cryptography. Springer Berlin Heidelberg (2011), pp.53-70.

Google Scholar

[17] A. De Caro and V. Iovino. Computers and Communications (ISCC), IEEE Symposium on (2011), pp.850-855.

Google Scholar