首页> 外文期刊>Future generation computer systems >Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
【24h】

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing

机译:基于密文策略的基于属性的加密,可防止雾计算中的密钥委托滥用

获取原文
获取原文并翻译 | 示例
       

摘要

In Fog Computing, fragile connection between Fog and Cloud causes problems of the authentication and authorization. Recently, Stojmenovic, Wen, Huang and Luan introduced a potential solution by adopting the concept of Stand-Alone Authentication (SAA) and equipped it with Attribute-based encryption (ABE) for its security in a large and dynamic information system. In such a system, a user's access right can be described as a set of attributes linking to his/her private key. In this paper, we note that if a user can generate a new private key for a portion of his/her access right, this could potentially lead to some undesirable situations, which violates the access control policy. Interestingly, to date, there is no work that looks into this matter in detail nor addresses it. We point out that this is a "property" that exists in ABE systems, which we refer to "key-delegation abuse". ABE systems that suffer from key-delegation abuse will hinder the adoption of these systems in practice. In this work, for the first time in the literature, we address the "key-delegation abuse" problem in Ciphertext-policy Attribute-based Encryption (CP-ABE) systems. We introduce a new mechanism to enhance CP-ABE schemes that provide protections against this key-delegation abuse issue. We formalize the security requirements for such a property, and subsequently construct a CP-ABE scheme that satisfies the new security requirements. We also present an application of our scheme to a traceable CP-ABE, where the "traitors", i.e. the users who have leaked their keys, can be traced.
机译:在雾计算中,雾和云之间的脆弱连接会导致身份验证和授权问题。最近,Stojmenovic,Wen,Huang和Luan提出了一种潜在的解决方案,它采用了独立身份验证(SAA)的概念,并为它配备了基于属性的加密(ABE),以确保其在大型动态信息系统中的安全性。在这样的系统中,用户的访问权限可以描述为链接到他/她的私钥的一组属性。在本文中,我们注意到,如果用户可以为其访问权限的一部分生成新的私钥,则可能会导致某些不良情况,从而违反访问控制策略。有趣的是,迄今为止,还没有任何工作可以详细研究或解决该问题。我们指出这是ABE系统中存在的“属性”,我们将其称为“密钥委托滥用”。遭受密钥委托滥用的ABE系统将在实践中阻碍这些系统的采用。在这项工作中,这是文献中的第一次,我们解决了基于密码文本策略基于属性的加密(CP-ABE)系统中的“密钥委托滥用”问题。我们引入了一种新的机制来增强CP-ABE方案,该方案可针对此密钥授权滥用问题提供保护。我们正式确定了此类财产的安全要求,随后构造了满足新安全要求的CP-ABE方案。我们还提出了该方案在可追踪CP-ABE上的应用,可在其中追踪“叛徒”,即泄露其密钥的用户。

著录项

  • 来源
    《Future generation computer systems》 |2018年第2期|720-729|共10页
  • 作者单位

    Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Australia;

    Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Australia;

    Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Australia;

    Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Australia;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Fog computing; Attribute-based encryption; Key-delegation abuse; Ciphertext-policy;

    机译:雾计算;基于属性的加密;密钥委托滥用;密文政策;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号