HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices

07/21/2021
by   Mostafa Chegenizadeh, et al.
0

Attribute-based encryption (ABE) is a promising cryptographic mechanism for providing confidentiality and fine-grained access control in the cloud-based area. However, due to high computational overhead, common ABE schemes are not suitable for resource-constrained devices. Moreover, data owners should be able to update their defined access policies efficiently, and in some cases, applying hidden access policies is required to preserve the privacy of clients and data. In this paper, we propose a ciphertext-policy attribute-based access control scheme which for the first time provides online/offline encryption, hidden access policy, and access policy update simultaneously. In our scheme, resource-constrained devices are equipped with online/offline encryption reducing the encryption overhead significantly. Furthermore, attributes of access policies are hidden such that the attribute sets satisfying an access policy cannot be guessed by other parties. Moreover, data owners can update their defined access policies while outsourcing a major part of the updating process to the cloud service provider. In particular, we introduce blind access policies that enable the cloud service provider to update the data owners' access policies without receiving a new re-encryption key. Besides, our scheme supports fast decryption such that the decryption algorithm consists of a constant number of bilinear pairing operations. The proposed scheme is proven to be secure in the random oracle model and under the hardness of Decisional Bilinear Diffie-Hellman (DBDH) and Decision Linear (D-Linear) assumptions. Also, performance analysis results demonstrate that the proposed scheme is efficient and practical.

READ FULL TEXT
research
09/10/2020

Multi-Authority Ciphertext-Policy Attribute Based Encryption With Accountability

Attribute-based encryption (ABE) is a promising tool for implementing fi...
research
01/25/2021

SEA-BREW: A Scalable Attribute-Based Encryption Scheme for Low-Bitrate IoT Wireless Networks

Attribute-Based Encryption (ABE) is an emerging cryptographic technique ...
research
12/01/2019

Purpose-based access policy on provenance and data algebra

It is a crucial mechanism of access control to determine that data can o...
research
04/17/2018

A Scalable Permission Management System With Support of Conditional and Customized Attributes

Along with the classical problem of managing multiple identities, action...
research
01/14/2018

Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead

Data retrieval systems such as online search engines and online social n...
research
03/21/2018

A Secure Proxy-based Access Control Scheme for Implantable Medical Devices

With the rapid development of health equipments, increasingly more patie...
research
07/31/2018

ABE-Cities: An Attribute-Based Encryption System for Smart Cities

In the near future, a technological revolution will involve our cities, ...

Please sign up or login with your details

Forgot password? Click here to reset