Sei sulla pagina 1di 15

PAbAC: a Privacy preserving Attribute based

framework for fine grained Access Control in clouds


Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent,
Rabah Attia

To cite this version:


Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia. PAbAC: a Pri-
vacy preserving Attribute based framework for fine grained Access Control in clouds. SECRYPT 2016
: 13th International Conference on Security and Cryptography, Jul 2016, Lisbon, Portugal. Scitepress,
Proceedings SECRYPT 2016 : 13th International Conference on Security and Cryptography, 4, pp.133
- 146, 2016, <10.5220/0005968201330146>. <hal-01391253>

HAL Id: hal-01391253


https://hal.archives-ouvertes.fr/hal-01391253
Submitted on 3 Nov 2016

HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est


archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents
entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non,
lished or not. The documents may come from émanant des établissements d’enseignement et de
teaching and research institutions in France or recherche français ou étrangers, des laboratoires
abroad, or from public or private research centers. publics ou privés.
PAbAC: a Privacy preserving Attribute based framework for fine
grained Access Control in clouds

Sana Belguith1,2 , Nesrine Kaaniche3 , Abderrazak Jemai4 , Maryline Laurent3 and Rabah Attia2
1 Laboratoryof Electronic Systems and Communication Network, Tunisia Polytechnic School
2 Telnet Innovation Labs, Telnet Holding
3 SAMOVAR, CNRS, Telecom SudParis, University Paris-Saclay
4 Laboratory LIP2, University of Sciences of Tunis, Tunisia

sana.belguith@telnet-consulting.com,{Nesrine.Kaaniche, Maryline.Laurent}@telecom-sudparis.eu

Keywords: Cloud storage systems, Attribute-based encryption, Attribute-based signature, Data confidentiality, Privacy.

Abstract: Several existing access control solutions mainly focus on preserving confidentiality of stored data from unau-
thorized access and the storage provider. Moreover, to keep sensitive user data confidential against untrusted
servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to au-
thorized users. However, these solutions inevitably introduce a heavy computation overhead on the data owner
for key distribution and data management when fine-grained data access control is desired. In addition, access
control policies as well as users’ access patterns are also considered as sensitive information that should be
protected from the cloud. In this paper, we propose PAbAC, a novel privacy preserving Attribute-based frame-
work, that combines attribute-based encryption and attribute-based signature mechanisms for securely sharing
outsourced data via the public cloud. Our proposal is multifold. First, it ensures fine-grained cryptographic ac-
cess control enforced at the data owner’s side, while providing the desired expressiveness of the access control
policies. Second, PAbAC preserves users’ privacy, while hiding any identifying information used to satisfy
the access control. Third, PAbAC is proven to be highly scalable and efficient for sharing outsourced data in
remote servers, at both the client and the cloud provider side.

1 INTRODUCTION minimized. Thus, the challenge is to define a com-


prehensive access control mechanism for outsourced
Data security and privacy are major challenges in the data while both ensuring data confidentiality and pro-
adoption of cloud storage applications, mainly due to tecting users’ privacy.
the loss of data control. It is commonly agreed that For instance, with the involvement of a third-party
data encryption at the client side is a good alterna- cloud provider, a crucial issue is that access patterns
tive to mitigate data secrecy concerns. As such, the may reveal privacy-sensitive information about users
client preserves the decrypting keys out of reach of the and potentially leak confidential information about
cloud. Although encryption assures the confidential- the content. The confidentiality of outsourced data
ity against curious cloud service providers, the use of and the privacy of users are thus not assured if these
conventional encryption approaches is not sufficient sensitive data are not protected.
to support the enforcement of fine-grained access con- In this paper, we propose PAbAC, a novel privacy
trol policies. That is, data confidentiality preserva- preserving Attribute-based framework, that com-
tion becomes more complicated, considering flexible bines Attribute Based Encryption (ABE) and At-
data sharing among dynamic groups of users. First, tribute Based Signature (ABS) mechanisms for se-
access control policies should be flexible and distin- curely sharing outsourced data via public clouds.
guishable among users with different privileges. Sec- PAbAC introduces a two-level access control model
ond, dynamic groups require efficient sharing of de- that combines fine-grained access control which en-
ciphering keys between different authorized users. In sures a comprehensive granularity for access rules,
fact, the subscription of a new group member should and anonymous data access, which allows the stor-
not require updating the secret keys of the remaining age server to manage access requests with no need to
users. So that, the complexity of key management is learn the user identity nor his attributes. The original-
ity of PAbAC is multifold. First, PAbAC introduces a vices is required to restrict access of protected medi-
privacy preserving authentication scheme, based on cal records to eligible doctors while a client relation
a novel use of attribute-based signatures.The iden- management system running on a cloud may allow ac-
tity of the requesting entity client remains protected cess of patients’ information to high-level executives
against the certifying authorities as well as the cloud of the hospital only. In many cases, hospital employ-
service provider. Moreover, the combination between ees, mainly doctors, have to share patients’ health in-
attribute based encryption mechanisms and attribute formation, in order to properly prescript treatments.
based signature scheme allows the cloud provider to Thus, they usually form dynamic sharing groups with
control the bandwidth consumption, and then, the sys- different granted privileges. Therefore, it is notewor-
tem’s availability. In fact, the authentication of re- thy that data confidentiality preservation is not the
questing users permits to mitigate Flooding attacks only security concern. It is crucial to support flexible
which exploit the bandwidth under provisioning vul- sharing of encrypted outsourced data among dynamic
nerability (Zunnurhain, 2012). Thus, only authorized group of users, while protecting users’ privacy. In a
users can download encrypted data. real e-health scenario, different medical organisations
Second, as a designed decentralised multi-authority can be involved such as hospitals, research laborato-
attribute based framework, PAbAC reduces the bottle- ries, pharmacies, health ministry as well as doctors
neck of maintaining a central authority for managing and patients. Let us consider that a doctor shares his
secret parameters. Additionally, it supports issuing a patients’ EHR in a public cloud. On one hand, the
set of attributes from each attribute authority unlike shared data have to be protected from unauthorized
other access control schemes which rely on issuing access while ensuring fine grained access control for
only one attribute per authority. different authorized actors. Moreover, the data confi-
Third, the original use of attribute based encryption dentiality must be preserved against a malicious cloud
and the related attribute based signature guarantees service provider. Thus, encryption on the client side
fine grained access control to outsourced data and should be applied while supporting flexible sharing of
provides an effective key management in sharing sce- outsourced data among dynamic group of users.
narios. For instance, the PAbAC framework is highly On the other hand, the private identifying information
scalable and offers interesting performances such as of the involved cloud users, such as doctors and pa-
low computation and communication cost, at both the tients, must not be revealed to the remote server. For
client and the cloud provider side. instance, the system should not reveal any private in-
Paper Organisation – The remainder of this work is formation related to a doctor, such as his professional
as follows: Section 2 presents security considerations card or its speciality, as well as his patients’ data. That
and design goals. Then, Section 3 reviews related is, the disclosure of such information may be used to
work and introduces attribute based mechanisms. In produce targeted advertisement related to the health
Section 4, we describe the system model and review condition of the patients, or to run statistical surveys.
some preliminaries and cryptographic primitives. Af- Thus, the design of PAbAC is motivated by providing
terwards, we detail the framework design and de- the support of both robustness and efficiency while
scribe the prototype and its different procedures in fulfilling the following properties:
Section 5. In Section 6, rigorous security discussions
• data confidentiality – PAbAC has to protect the
are given. Finally, theoretical performances analysis
secrecy of outsourced and encrypted data contents
is provided in Section 7, before concluding in Sec-
against both curious cloud service providers and
tion 8.
malicious users.
• flexible access control – our proposal should en-
sure flexible security policies among dynamic
2 PROBLEM STATEMENT groups of users with different granted privileges,
belonging to different groups.
Let us consider the following example, where a hospi-
• privacy – PAbAC must protect group members’
tal supports fine-grained access control on Electronic
access patterns privacy, while requesting access to
Health Records (EHRs) and makes these records
outsourced data. That is, the cloud server must
available to hospital employees through a public
be able to grant access with no need to additional
cloud. In accordance with regulations such as the
identifying information of the requesting users.
Health Insurance Portability and Accountability Act
(HIPAA) (HIP, ), the hospital policies must specify • low computation overhead – on one hand, for
which users can access which data item(s). In fact, scalability reasons, the amount of computation at
a health-care information system based on cloud ser- the cloud storage server should be minimized, as
the server may be involved in concurrent interac- one particular user as in traditional public key cryp-
tions. On the other hand, the proposed algorithms tography. Instead both users’ private keys and ci-
should also have low processing complexity, at the phertexts are associated with a set of attributes or a
client side. structure over attributes (Bethencourt et al., 2007).
• low storage cost – PAbAC should provide accept- The user is able to decrypt a ciphertext if there is a
able storage cost at the client side. match between his private key and the ciphertext. For
instance, Goyal et al. distinguishes two ABE cate-
gories, namely: Key-Policy ABE (KP-ABE) (Goyal
et al., 2006) and Ciphertext-Policy ABE (CP-ABE)
3 RELATED WORK (Bethencourt et al., 2007). Several works rely on ABE
to provide fine grained access control for outsourced
Several research works have been proposed in the lit- data (Hur and Noh, 2011),(Yu et al., 2010b),(Jahid
erature in order to securely share data among groups et al., 2011). Although these schemes proposed effi-
of users while protecting their privacy (Horváth, cient solutions to protect outsourced data, they require
2015),(Kaaniche et al., 2014),(Wan et al., 2012),(Yu the use of a central trusted authority to manage all
et al., 2010a), (Raykova et al., 2012), (Di Vimer- the attributes and issue the related secret keys to users
cati et al., 2010b). In order to prevent untrusted in the system. Thus, this central authority is able to
servers from accessing outsourced data, several so- achieve a key escrow attack, due to its knowledge of
lutions apply encryption mechanisms at the client the users’ private keys.
side while disclosing the decryption keys to autho- Wang et al. (Wang et al., 2010) propose a hierarchical
rized users only (Benaloh et al., 2009),(Di Vimer- access control mechanism for cloud storage. Their
cati et al., 2010a), (Kaaniche et al., 2013), (Benaloh scheme is based on the Bethencourt et al. CP-ABE
et al., 2009), (Di Vimercati et al., 2015). Although scheme (Bethencourt et al., 2007) and hierarchical
these methods ensure secure data access control, the Identity based Encryption (IBE) (Horwitz and Lynn,
key distribution remains a bottleneck. For instance, 2002). This scheme relies on the use of several au-
it becomes more complicated with the increase of the thorities arranged in a hierarchical way. However, it
number of users. To deal with this concern, Wang still relies on the trusted authority and fails, if the lat-
et al. (Wang et al., 2009) propose to deliver the key ter is compromised.
management to the remote server while assuming that Recently, Lewko and Waters (Lewko and Waters,
this latter is trusted. Moreover, in order to enforce au- 2011) proposed a decentralized ABE scheme, where
thorization policies, De Vimercati et al. (Di Vimercati users could obtain their private keys from different
et al., 2007) proposed a novel solution aiming to en- attribute authorities. Each attribute authority is in
force the access control to the outsourcing systems. charge for deriving a private key associated to a one
De Vimercati et al. proposal is based on the appli- attribute. The proposal (Lewko and Waters, 2011)
cation of selective encryption as a means to enforce did not require a central trusted server, which must
authorizations while applying hierarchical key assign- remain active and uncorrupted throughout the life-
ment schemes. time of the system. Based on this decentralized ar-
Recently, Attribute-based Cryptography appears as chitecture, there is no need for absolute trust in a
a promising technique, designed for ensuring fine single designated entity. However, Lewko and Wa-
grained access control for outsourced data. This cryp- ters (Lewko and Waters, 2011) assume that each at-
tographic mechanism was introduced by Sahai and tribute authority is responsible for issuing only one
Waters in 2005 (Sahai and Waters, 2005). attribute. Moreover, in order to prevent collusion in
In the following, we present Attribute based Encryp- such a setting, this scheme requires that each user
tion mechanisms (ABE) and their application in cloud has a unique global identifier (GID), which they must
environments in Section 3.1. Then, we introduce At- present to each authority. Unfortunately, due to the
tribute based Signature schemes (ABS) and review re- use of GID, the users cannot preserve their privacy
lated work applying ABS for protecting access to out- against attribute authorities. In fact, while a user must
sourced data in cloud servers. present the same GID to each authority, colluding au-
thorities can pool their data and build a complete pro-
3.1 Attribute based Encryption (ABE) file of all of the attributes corresponding to each GID.
However, this might be undesirable, particularly if the
In 2005, Sahai and Waters introduced the concept of user uses the ABE system in many different settings
Attribute Based Encryption (ABE), as a new mean for and wants to keep information about some of those
encrypted access control (Sahai and Waters, 2005). settings private. Based on the Lewko and Waters pro-
In ABE, ciphertexts are not necessarily encrypted to
posal (Lewko and Waters, 2011), Ruj et al. (Ruj constructions of ABS consider multiple authorities
et al., 2011) proposed a distributed sharing scheme while others only support a single attribute authority.
in cloud environments scheme with an attribute revo- Okamoto et al. (Okamoto and Takashima, 2013) and
cation extension (DACC). The DACC solution con- El Kaafarani et al. (El Kaafarani et al., 2014b) have
sists of using one or several key distribution centers proposed the first fully decentralized attribute based
responsible for issuing keys to data owners and users signatures schemes. These schemes consist of involv-
related to their attributes. The data owner encrypts ing multiple attribute authorities in the system, with
data under an access structure and stores them in the no reliance on a central authority. The security of at-
cloud. The users, while matching their set of at- tribute based signatures requires users’ privacy and
tributes to the access structure, can retrieve the data unforgeability. On one hand, users’ anonymity re-
from the cloud. We must note that the DACC proposal quires that signatures reveal neither users’ identities
also supports revocation of users, without redistribut- nor the attributes used in the signing algorithm. On
ing keys to all the users of cloud services. In 2015, the other hand, unforgeability requires that a user can-
Horvá (Horváth, 2015) proposed a decentralized ABE not forge a signature with respect to a signing predi-
scheme for securely sharing data in cloud computing cate that the user attributes do not satisfy, even if this
systems based on the use of the decentralized Lewko user colludes with other users (Ghadafi, 2015).
and Waters scheme (Lewko and Waters, 2011). In Several works rely on the attribute based signature
order to achieve an efficient revocation scheme, this to ensure the authentication of data owners and fine
proposal relies on the use of an identity based user re- grained access control to outsourced data in the cloud.
vocation mechanism to manage access rights for out- Indeed, Ruj et al. (Ruj et al., 2012) presented a pri-
sourced data. This proposed extension supports mul- vacy preserving authenticated access control scheme
tiple independent attribute authorities in which revo- for securing data in clouds based on an attribute based
cation of specific users (e.g. based on users’ identi- signature scheme. In the proposed scheme, the cloud
ties) from the system is possible without updates of provider verifies the authenticity of the data owner
attribute public and secret keys. without knowing the user’s identity before storing in-
Most of the mentioned approaches do not propose a formation. To do so, this scheme uses a combina-
mechanism to authenticate requesting users. More- tion of the decentralized attribute based encryption
over, these schemes are based on the use of Lewko (Lewko and Waters, 2011) and the multi-authority at-
et al. decentralised ABE scheme (Lewko and Waters, tribute based signature proposed by Maji et al. (Maji
2011) which requires the use of the users’ global iden- et al., 2011). This proposal relies on the use of a
tifiers GIDs. Thus, the privacy of the user is not pro- global identifier GID in order to issue private keys
tected against the attribute authorities. from attribute authorities to users, thus the attribute
authorities can reveal the user’s identity. Finally, the
proposed authentication scheme is used to authenti-
3.2 Attribute based Signature (ABS)
cate the data owner and there is no way to authenticate
the requesting users. In (Zhao et al., 2011), Zhao et
Attribute-Based Signatures (ABS) (Maji et al., 2011) al. applied the ciphertext-policy attribute based en-
is a flexible primitive that enables a user to sign a cryption (CP-ABE) proposed by Bethencourt et al.
message with fine grained access control over iden- (Bethencourt et al., 2007) combined with the Maji
tifying information. In ABS, the user possesses a set et al. (Maji et al., 2011) attribute based signature to
of attributes, obtained from a trusted authority. This ensure fine grained access control to outsourced data
latter can sign a message with respect to a predicate in the cloud. This proposal does not take interest in
satisfied by his attributes. The signature reveals no authenticating the requesting users. Moreover, it is
more that the fact that a single user with some set based on a centralized ABE and ABS schemes, thus
of attributes satisfying the predicate has attested to it relies on a central trusted authority to issue secret
the message. Maji et al. presented a comparison of keys to all the users.
ABS with other signature-related-notions (Maji et al.,
2011), such that ring signatures (Rivest et al., 2001)
and group signatures (Chaum and Van Heyst, 1991)
that can be considered as particular categories of at- 4 PABAC SYSTEM
tribute based signatures (El Kaafarani et al., 2014a).
In (Maji et al., 2011), Maji et al. also introduced dif-
ferent applications of ABS including attribute-based In this section, we present our system model in sec-
messaging (Bobba et al., 2006), trust negotiation tion 4.1 and the mathematical background is pre-
(Frikken et al., 2006) and leaking secrets. Some sented in section 4.2.
4.2 Mathematical Background
In this section, we first introduce the access structure
in section 4.2.1. Then, in section 4.2.2, we present
the bilinear maps. Finally, we introduce our security
assumptions.

4.2.1 Access policies

Access policies can be represented by one of the fol-


Figure 1: The main architecture entities and their interac- lowing formats: i) Boolean functions of attributes, ii)
tion Linear Secret Sharing Scheme (LSSS) matrix, or iii)
Monotone span programs (Lewko and Waters, 2011).
Definition 1. Access Structure
Let {P1 , · · · , Pn } be a set of parties. A collection
4.1 System Model A ⊆ 2{P1 ,··· ,Pn } is monotone if ∀B,C if B ∈ A and B ⊆ C
then C ∈ A (Lewko and Waters, 2011).
An access structure is a collection A of non-empty
subsets of {P1 , · · · , Pn }, such as A ⊆ 2{P1 ,··· ,Pn } \0.
/
Figure 1 presents the different entities involved in We note that any access structure can be converted
PAbAC and defined as follows: into a Boolean function. Boolean functions can
Cloud Service Provider (CSP): the CSP is assumed be represented by an access tree, where the leaves
to have abundant storage capacity and computation present the attributes while the intermediate and the
resources in order to manage data storage service. root nodes are the logical operators AND (∧) and OR
The cloud provider consists of data servers and a data (∨).
service manager. Data servers are responsible for Definition 2. Linear Secret Sharing Schemes (LSSS)
storing data outsourced by the data owner while the A Linear Secret Sharing Scheme LSSS over a set
data manager is in charge of controlling the accesses of parties P (Lewko and Waters, 2011) is defined as
from requesting users to outsourced data and provid- follows:
ing corresponding contents services.
1. the shares of each party form a vector over Z p .
Data Owner (O): the data owner is responsible for
outsourcing data into the remote cloud servers and 2. there exists a matrix A with n rows and l columns
granting access privileges to other cloud users, by called the share-generating matrix for LSSS. ∀i ∈
specifying an attribute-based access policy for each [1, · · · , n], the ith row of A is labeled by a party ρ(i)
data file. ( where ρ is function from {1, · · · , n} to P). When
Users (U): a user is a cloud client that may access to we consider the column vector ~v = [s, r2 , · · · , rn ],
outsourced content by data owners. In a nutshell, if where s ∈ Z p is the secret to be shared, and
a user has the set of attributes satisfying the access r2 , · · · , rn ∈ Z p are randomly chosen, then A.~v =~λ
structure of the encrypted data file, he then may have is the vector n shares of the secret s according to
access to data. LSSS.
Trusted Authority (TA): TA is a trusted third party In (Beimel, 1996), Beimel presents the algorithm that
in our system which is responsible for generating and converts a boolean function (in the form of access
managing public parameters for both used mecha- tree) as a LSSS matrix.
nisms: attribute based encryption and attribute based
signature. Definition 3. Monotone Span Programs
Attribute Authority (AA): AA is a party responsi- For a field F and a variable set S = {a1 , ..., an }, a
ble for deriving a public keys and issuing private keys Monotone Span Program (Karchmer and Wigderson,
to different users that are assigned to their attributes. 1993) is defined by a α × β matrix A along with a
The Attribute Authority can be considered as an Iden- labeling map ρ which associates each row in A with
tity Provider. In PAbAC, any trusted party can be- an element ai ∈ S. The span program accepts a set
come an attribute authority and there is no require- γ if 1 ∈ Span(Aγ ), where (Aγ ) is the sub-matrix of
ment for any global coordination other than the cre- A containing only rows with labels a1 ∈ γ. In other
ation of an initial set of common public parameters. words, the span program only accepts the set γ if there
exists a vector s such that s · Aγ = [1, 0, ..., 0].
4.2.2 Bilinear maps CP-ABE is much more appropriate to data outsourc-
ing, since it enables the data owner to generate an ac-
An admissible symmetric pairing function ê from cess tree over selected attributes. Thanks to its flex-
G1 × G1 in GT has to be bilinear, non degenerate ibility in specifying different access rights for each
and efficiently computable. G1 and GT are two mul- individual user, ABE is considered as one of the most
tiplicative subgroups of a finite field. G1 and GT have public key primitive which is appropriate for one-to-
the same order N. many communications. That is, data are encrypted
under a set of attributes so that multiple users who
4.2.3 Complexity Assumptions possess proper keys can decrypt. This potentially
makes encryption and key management more effi-
Our proposal is based on three cryptographic assump- cient. Moreover, the enciphering entity is not required
tions detailed as follows: to know the access control list.
Definition 1. Discrete Logarithm Problem (DLP) In order to protect the requesting entity’s privacy,
PAbAC relies on using Attribute based Signature
Given a generator g of a multiplicative cyclic (ABS). In ABS, messages are signed with respect to
group G of order N, and given the public element an access structure. Thus, the CSP verifies that the
y = gx ∈ G, the problem of finding x is called the Dis- requesting user having a set of attributes satisfying
crete Logarithm Problem. the access tree has indeed authenticated the message
Definition 2. Computational Diffie Hellman prob- without revealing his identity or the set of attributes
lem (CDH) used in the signing procedure.
Given a generator g of a multiplicative cyclic Our PAbAC framework is based on an original use
group G of order N, and given two group elements of the identity based signature scheme presented by
ga ∈ G and gb ∈ G where a, b ∈ ZN are two secrets, Waters (Waters, 2005) combined with the decen-
the problem of calculating gab from ga and gb is called tralized Attribute Based Encryption introduced by
the Computational Diffie Hellman problem. Lewko and Waters (Lewko and Waters, 2011) to
achieve an extension of waters’ scheme to a multi-
Definition 3. Decisional Diffie Hellman problem authority attribute based encryption. This novel en-
(DDH) cryption scheme presented by PAbAC supports the is-
Given a generator g of a multiplicative cyclic suance of a set of attribute obtained from the same
group G of order N, and given two group elements authority. Moreover, PAbAC introduces an origi-
ga ∈ G and gb ∈ G where a, b ∈ Z∗N are two secrets, the nal multi-authority attribute based signature scheme
problem of distinguishing between tuples of the form based on an extension of Waters’ identity based sig-
(ga , gb , gab ) and (ga , gb , gc ) for some random integer nature adapted to the multi-authority ABE encryption.
c, is called the Decisional Diffie Hellman problem. Thus, PAbAC presents lower computation costs espe-
cially at the client side compared with the other access
control schemes. The different notations used in this
5 PABAC: PROPOSED SOLUTION paper are listed in Table 1.

Table 1: The different notations used in this paper


5.1 Motivation Notation Description
In order to achieve fine grained and privacy preserv- SU Set of users’ attributes
ing access control to outsourced data in cloud storage, Sj Set of attributes certified by the at-
we combine two latest cryptographic techniques, CP- tribute authority AA j
ABE and ABS. The choice of attribute based cryptog- SkS j Secret keys related the set of at-
raphy (ABC) is motivated by several reasons. First, tributes S j obtained from the at-
we benefit from an easier key management system, tribute authority AA j
thanks to the certificate-free feature of ABC. Second, AA Attribute Authority
ABC permits deriving public keys with no need for DF Data file
previous computation of corresponding private keys. O Data Owner
That is, contrary to traditional public key derivation U User
schemes, ABC does not require to generate the private ED Encrypted data file
key before the public key. Indeed, users have only to ψ Access policy
generate access structure and the related enciphering
key to encrypt data before storage.
5.2 Overview put the security parameter λ. It outputs the global
public parameters PP defined as follows:
In PAbAC, there are two main actors: a data owner
PP = {G1 , GT , N, h, ê, u0 , · · · , un }
(O) and data users (U). The data owner first defines
an access structure ψ that points out who can access where G and G1 are two multiplicative groups of
the outsourced data with respect to a set of attributes. order N, ê : G1 × G1 → GT is a bilinear map, g, h
Then, the data file is encrypted under the access struc- are generators of G1 and {u0 = g, · · · , un } are gen-
ture ψ, based on an attribute based encryption algo- erators of G1 randomly chosen such as ui = gr .
i

rithm. Then, the data owner stores the encrypted data


in the cloud. When a user wants to access the out- • setupauth – the setupauth algorithm is executed
sourced data file, he has first to authenticate with the by an attribute authority AA. The setupauth al-
cloud. For this purpose, he has to sign a random gorithm takes as inputs the public parameters PP
message, obtained from the cloud, under the access and outputs the pair of private and public keys
structure ψ associated with the outsourced data file. (skA , pkA ), where skA correspond to a random val-
Afterwards, the cloud verifies the correctness of the ues α, and the related public key pkA is defined as
received signature in order to send the requested ele- follows:
ments, namely the encrypted data file. pkA = {ê(g1 , g1 )α }
We suppose that each cloud user has already obtained
the private keys related to his attributes from the cor- • keygen – this algorithm is performed by an at-
responding attribute authorities. For an e-health use tribute authority AA j . It takes as input the global
case, an attribute authority may be the hospital ad- parameters PP, the attribute authority’s secret key
ministration issuing the affiliation card of each doctor {skA }, a random value t where t ∈ Z p and a set
(i.e the professional card contains a set of attributes of attributes S j = {a1 , · · · , an j }, where n j is the
such as the name of the doctor, his affiliation, his se- number of attributes of S j . It outputs the secret
rial number, · · · ). key skS j related to the set of attributes S j , as de-
Based on the required attributes, specified in the ac- picted by Algorithm 1.
cess structure ψ, the requesting user selects related
private keys in order to decrypt the encrypted data file.
Algorithm 1 keygen procedure
Our PAbAC proposal is defined upon the following
seven algorithms. It involves three procedures on the 1: Input: the global parameters PP, the attribute au-
basis of two phases. During the first phase, the system thority’s secret key {skA j } and a set of attributes
initialisation procedure S YS I NIT is executed. The Sj
second phase occurs when the data owner wants to 2: Output: the secret key skS j related to the set of
share data files with other cloud users, based on both attributes S j
the data storage procedure S TORE and the data re- 3: K ← g1 α · ht ;
trieval procedure BACKUP. 4: L ← g1 t ;
The S YS I NIT procedure consists of three random- 5: skS j ← {K, L};
ized algorithms for the generation of public param-
6: for all i ∈ [1 . . . n j ] do
eters related to the involved attribute authorities re-
7: Ki ← ui t ;
ferred to as setup and setupauth , and the generation
8: skS j ← skS j ∪ Ki ;
of users’ private keys denoted by keygen.
9: end for
The S TORE procedure presents the data storage sce-
10: return skS j
nario. It consists of the encdata algorithm for the
encryption of data files.
For the data retrieval scenario, the BACKUP procedure
deals with the user’ authentication, namely sign and
verif and the data decryption algorithms referred to
5.4 Data Storage Procedure
as decdata.
To outsource a data file (DF ) to the cloud, the data
owner (O) performs the S TORE procedure. For this
5.3 System Initialisation Procedure purpose, he first defines an access policy ψ and ob-
viously selects the attribute needed to satisfy it. We
The S YS I NIT procedure consists of three random- note that the access policy ψ is described in terms
ized algorithms, defined as follows: of a monotonic boolean formula. We represent the
• setup – this randomized algorithm takes as in- boolean formula as an access tree where the interior
nodes are AND and OR gates, and the leaf nodes cor-
respond to attributes as detailed in Section 4.2.
Thus, the access policy corresponds to the couple
(A, ρ) where A is an n × l access matrix and ρ is the
function that maps the matrix rows to the required at-
tributes. These attributes have to be obtained from a
certified Attribute authority (AA) that is responsible
of issuing the required attributes.
After defining the access structure (A, ρ), the data
owner encrypts the data file DF , based on the
encdata algorithm. We note that our encryption al- Figure 2: PAbAC data storage procedure S TORE
gorithm relies on the decentralized Lewko and Wa-
ters ABE scheme (Lewko and Waters, 2011). That is,
we extend the (Lewko and Waters, 2011) proposal to
support deriving a set of private keys related a set of
attributes from each single attribute authority, while
preserving users’ privacy with respect to the involved
attribute authorities.
The S TORE procedure consists of the encdata algo-
rithms, defined as follows:
• encdata – the encryption algorithm encdata
is executed by the data owner. It takes as in- Figure 3: PAbAC data backup procedure BACKUP
put the attribute authorities’ public keys {pkA },
the data file DF , the public parameters PP and
the access policy (A, ρ). The encdata algo- the cloud provider upon requesting access to an out-
rithm outputs the ciphertext as a tuple ED = sourced data file ED . Then, we present, in Sec-
(C0 ,C1,i ,C2,i ,C3,i )i∈{1,n} (where i presents a ma- tion 5.5.2, the algorithm needed for decrypting the
trix row corresponding to attribute i) defined as outsourced data file.
follows:
C0 = DF ê(g1 , g1 )s (1) 5.5.1 Anonymous User Authentication

C1,i = ê(g1 , g1 )λi (2) When a user (U) wants to access to the encrypted data
pi file (ED ) outsourced by the data owner, the CSP has
C2,i = g1 (3)
to first authenticate the user, with respect to the ac-
pi wi pi
C3,i = g1 g1 ui (4) cess tree ψ associated with the encrypted data file. So
that, the cloud provider sends a random value m which
Where pi , s ∈ ZN are random values selected by
consists of the cloud provider identity concatenated
the data owner, λi = ~Ai ·~v where ~v ∈ ZN l is a ran- with the current time (i.e. m is assumed to be different
dom vector with s as its first entry and wi = ~Ai ·~τ for each authentication session). The requesting user
such as ~τ ∈ ZN l is a random vector with 0 as its has then to sign the received value m with respect to
first entry. the signing predicate ψ, and sends his signature to the
Figure 2 depicts the storage procedure S TORE of the cloud provider. We note that if the verification fails,
PAbAC framework. the user cannot access to data and the cloud provider
does not send the encrypted data file. The anonymous
5.5 Data Backup Procedure authentication procedure consists of two algorithms,
defined as follows:
For the data retrieval scenario, the BACKUP proce- • sign – this algorithm takes as input the global
dure starts with the user’ authentication, with respect public parameters PP, a random token m, a sign-
to the sign and verif algorithms and is achieved by ing policy ψ and the set of attributes’ secret keys
the data decryption algorithm referred to as decdata. {skS j } that satisfies the signing predicate. It out-
The figure 3 presents different interactions between puts a signature σ.
the cloud provider and the requesting user for the In fact, the user first selects the sub-set of his at-
data access procedure. We detail, in Section 5.5.1, tributes SU that satisfies the signing predicate ψ,
the different algorithms for user authentication with such as: ψ(SU ) = 1 and signs the received value
m. The user finally sends the signature σ to the • decdata – this algorithm takes as input the user
cloud provider who checks the resulting signature. secret decryption key {skS j }, the public parame-
Thus, the user first converts ψ to its corresponding ters PP and the ciphertext ED and outputs the orig-
monotone span program A which is an n×l access inal data file DF . If the requesting user has the re-
matrix, with respect to the row labeling function quired private keys {skS j } for a subset of rows Ai
ρ : [n] → SU . In addition, he computes the vector of A such that [1, 0, · · · , 0] is in the span of these
~y such as ψ(SU ) = 1 and ~y · ~A = [1, 0, · · · , 0]. In rows, then the user proceeds as follows.
order to sign the random token m, the data owner For each matrix row i, the user computes:
first randomizes his secret key skS j as follows:
C1,i .ê(L,C3,i )
= ê(g1 , g1 )λi ê(g1 t , g1 )wi (12)
0 t0 α t+t 0 ê(LKi ,C2,i )
K = Kh = g1 h (5)
0
L0 = Lg1 t = g1 t+t
0
(6) ∏(ê(g1 , g1 )λi ê(g1t , g1 )wi )ci = ê(g1 , g1 )s (13)
i
0 0
Ki0 = Ki ui t = ui t+t , ∀i ∈ SU (7) Where ci ∈ ZN are constants such that ∑i ci~Ai =
[1, 0, · · · , 0].
In the sequel, the requesting user’s new pri- Then, the data file DF can then be obtained as fol-
vate key is defined by {skS0 j } such as {skS0 j } = lows:
{(K 0 , L0 , Ki0 )}. DF = C0 /ê(g1 , g1 )s (14)
Then, for each i ∈ [1, n], the signer computes xi =
(L0 )yi and sets z = ∏ni=1 ((Kρ(i)
0 )yi . Afterwards, the The proof of correctness of the decryption algo-
rithm is detailed in the Section 6.4.
signer generates a random r ∈ ZN and computes:

σ1 = zK 0 g1 mr (8)
6 SECURITY DISCUSSION
σ2 = g1 r (9)
Finally, the signature for the message m gener- In this section, we discuss the resistance of PAbAC
ated by the user with respect to the signing policy against two adversaries, based on two realistic threat
(A, ρ) is set as follows: models, defined hereafter in Section 6.1. We prove
the security of our proposed scheme with respect to
σ = (x1 , · · · , xn , σ1 , σ2 ) (10) the security requirements introduced in Section 2.

• verif – this algorithm is a deterministic algo- 6.1 Threat model


rithm which takes as input an ordered list of at-
tribute authorities’ public keys {pkA }, a random For designing the most suitable security solutions for
token m, a signature σ and a signing predicate cloud sharing scenarios, we consider two adversaries:
ψ corresponding to (A, ρ) and outputs accept if malicious cloud user and honest but curious cloud
σ is valid on m using the access policy (A, ρ) or server.
reject otherwise. Afterwards, the CSP com- Honest but curious cloud server adversary – this
putes the vector ~β = [β1 = 1, β2 , · · · , βn ], such storage server honestly performs the operations de-
that {βi }i∈[2,n] are randomly chosen and computes fined by our proposed scheme, but it may actively at-
µi = ∑ j=1 l β j Ai, j . The cloud server accepts the tempt to gain knowledge of the outsourced sensitive
signature if the following equation holds. data, such as access patterns.
Malicious user adversary – this attacker can be an
n
?
ê(g1 , σ1 ) = pkA ê(g1 m , σ2 ) ∏ ê(hµi uρ(i) , xi ) (11) unauthorized user. As such, he targets to get access to
i=1 the outsourced shared data. The objective of a mali-
cious user is to convince the cloud server that he is a
The correctness of the signature algorithm is detailed legitimate cloud user.
in the Section 6.4.
6.2 Confidentiality
5.5.2 Data Retrieval
In our proposed PAbAC scheme, data files are stored
The data retrieval procedure consists of decdata al- on an encrypted form in cloud servers relying on an
gorithm, defined as follows: attribute based encryption scheme, in order to ensure
efficient access control. As such, the data confiden- [1, 0, · · · , 0] = 0. In the sequel, an authorized user can
tiality preservation is tightly related to security of the obtain the data DF as follows:
used attribute based encryption scheme.
DF = C0 /ê(g1 , g1 )s (18)
Theorem 1. PAbAC guarantees data confidentiality
of the outsourced data. For an unauthorized user who does not possess the
secret keys related to the set of attributes required for
Proof. The proposed PAbAC framework is designed satisfying the access policy, it is impossible to com-
to ensure data confidentiality against both malicious pute ∑i ci~Ai = [1, 0, · · · , 0] (Lewko and Waters, 2011).
users and curious cloud provider. Thus, ê(g1 , g1 )s cannot be calculated and the adver-
In PAbAC, the data owner is in charge of encrypting sary cannot recover the data file DF .
his data before outsourcing them to the cloud stor-
age server. He is also responsible for defining an
access structure that points out who can access the
6.3 Privacy
outsourced data with respect to a set of attributes.
Then, the cloud provider is responsible for sending Based on an attribute based signature scheme, PAbAC
data to requesting users after authenticating them, re- ensures users’ privacy against curious cloud provider.
lying on the access policy defined by the data owner. In our proposed scheme, the requesting data user has
As such, only the authorized users having the access to authenticate with the cloud provider. As such, (U)
structure’s satisfying attributes can generate the deci- has to sign a message received from the cloud service
phering keys. provider with respect to the access structure defined
In addition, while considering a curious cloud ser- by the data owner. The CSP is responsible for verify-
vice provider who tries to gain knowledge about out- ing the user’s access rights without knowing neither
sourced data file, this latter cannot access the out- his identity nor the attributes used to sign the mes-
sourced data. As detailed in Section 5, our encryption sage. But, beyond the ABS properties, our PAbAC
algorithm relies on the Lewko and Waters proposal. scheme ensures the protection of the users identities’
That is, PAbAC inherits the security properties from ( non traceability property). In fact, the ABE scheme
(Lewko and Waters, 2011). In addition, data confi- used does not reveal the encryptor identity neither
dentiality preservation against malicious users and a the users’ attributes used in the backup phase. The
curious cloud provider is ensured based on the secu- PAbAC inherits the non traceability property from the
rity of our proposed access control scheme detailed in Lewko encryption scheme (Lewko and Waters, 2011).
the Section 6.4 and the security level of the applied Theorem 2. PAbAC signature scheme is a privacy
encryption scheme (c.f. Lemma 1). preserving signature.
Lemma 1. Unauthorized users cannot decrypt the en- Proof. The PAbAC signature scheme does not reveal
crypted data. neither the identity of the signer nor the set of at-
tributes used in the signing. Our signature scheme
Proof. The proof of this lemma is equivalent to the requires that the identity of the signer remains anony-
security of the data decryption algorithm. The cor- mous. Thus, PAbAC ensures that a signature does not
rectness of our decryption algorithm is as follows: reveal more information other than what can be al-
A user can decrypt data if and only if it has a match- ready inferred from the signing predicate itself. The
ing set of attributes. In fact, access structure ψ (and demonstration of this state is derived from the follow-
hence matrix A) is constructed if and only if there ex- ing lemmas.
ists a set of rows Ai in A, and linear constants ci ∈ ZN
such that ∑i ci Ai = [1, 0, · · · , 0]. Lemma 2. PAbAC protects user’s anonymity
We note that
C1,i ê(L,C3,i ) Proof. In the authentication procedure, the user has
(15) to sign a random message received from the CSP.
ê(LKi ,C2,i )
Based on the signature scheme introduced in PAbAC,
ê(g1 , g1 )λi ê(g1 t , g1 pi )ê(g1 t , g1 wi )ê(g1 t , ui pi ) the user signs the message using his private keys
= (16)
ê(ui t , g1 pi )ê(g1 t , g1 pi ) which have already been randomized. Thus, the gen-
Thus erated signature does not reveal the attributes used
neither the user’s private keys. Based on the hard-
∏(ê(g1 , g1 )λi ê(g1 , g1 )twi )ci = ê(g1 , g1 )s (17) ness of the Computational Diffie Hellman problem
i
(CDH), the CSP can not deduce the user’s private
We note that Equation (17) holds because λi = keys related to the used attributes from the signature
~Ai ·~v, wi = ~Ai ·~τ, where ~v · [1, 0, · · · , 0] = s and ~τ · σ = (x1 , · · · , xn , σ1 , σ2 ) received.
In addition, let us consider a curious cloud provider Lemma 4. Data Decryption Correctness.
adversary that chooses a message m, a signing policy
and two requesting users with two, possibly different, Proof. After receiving his attributes’ secret keys
sets of attributes with the condition that both sets have {skS j }, the authorized user first computes:
to satisfy the signing policy. The adversary gets a sig-
C1,i ê(L,C3,i )
nature by either signer and wins if it correctly guesses = (ê(g1 , g1 )λi ê(g1 , g1 )twi )ci (22)
the signer. The curious provider has a negligible ad- ê(LKi ,C2,i )
vantage to win the previous game. That is, the PAbAC Then, he computes the constants ci ∈ ZN such that
signature scheme is based on the randomization of the ∑i ci · ~Ai = [1, 0, · · · , 0]. Then, ê(g1 , g1 )s could be ob-
signer secret keys. tained as follows:
Lemma 3. PAbAC’s signature scheme is unlinkable
∏(ê(g1 , g1 )λi ê(g1 , g1 )twi )ci (23)
i
Proof. Let us consider that a curious cloud provider
aims to deduce identifying information about a re- = ê(g1 , g1 )∑i λi ci ê(g1 , g1 )∑i twi ci = ê(g1 , g1 )s (24)
questing user by running different authentication ses-
sions. In the PAbAC sign algorithm, the user ran- Note that λi = ~Ai ·~v where ~v = [s, v2 , · · · , vn ] and wi =
domises the attributes’ secret keys received from the ~Ai ·~τ such as~τ = [0, τ2 , · · · , τn ]. Consequently, we note
attributes authorities as follows: that ∑i λi ci = s and ∑ twi ci = 0.
0 Afterwards, the user can recover the data file DF as
K 0 = Kht (19) follows:
t0 DF = C0 /ê(g1 , g1 )s
L0 = Lg1 (20)
t0
Ki0
= Ki ui ∀i ∈ SU (21)
Then, in every authentication session, the user gen- Lemma 5. Data signature correctness
erates a new signature σ = (x1 , · · · , xn , σ1 , σ2 ) thanks
to the selected random value t 0 . Moreover, the CSP Proof. When an authorized user wants to access out-
sends a random value m which consists of the cloud sourced data, he has to provide a correct signature,
provider identity concatenated with the current time with respect to the access policy defined by the data
(i.e. m is assumed to be different for each authen- owner, that can be verified by the CSP in an anony-
tication session). As such, while authenticating the mous way. If σ = (x1 , · · · , xl , σ1 , σ2 ) is a valid signa-
same user based on different authentication sessions, ture of the message m for the predicate ψ, then
a curious cloud service provider cannot identify the
σ1 = zK 0 gm r (25)
requesting user.
n
0 0
6.4 Access Control to Data = g1 mr ht+t g1 α ∏ (ui (t+t ) )yi (26)
i=1

PAbAC introduces two-level access control model Thus


that combines the authentication of the requesting n
0 0
users and the attribute based decryption algorithm. In ê(g1 , σ1 ) = ê(g1 , g1 mr ht+t g1 α ∏ (ui (t+t ) )yi ) (27)
i=1
the following, we demonstrate that our PAbAC access
control enforcement is resistant against both mali- 0
n
0
cious data users and a curious cloud service provider. = pkA ê(g1 , g1 r )m ê(g1 , ht+t ) ∏ ê(g1 , ui (t+t ) )yi )
i=1
Theorem 3. Authorized users can successfully au- (28)
thenticate and decrypt enciphered data files. n
m µi
= pkA ê(g1 , σ2 ) ∏ ê(xi , h ui ) (29)
We recall that cloud users have to collect their cer- i=1
tified attributes and the related secret keys from at-
tribute authorities AAs. As such, in PAbAC, only Note that µi = ∑lj=1 β j Ai, j , the last equality is obtained
users, having valid private keys related to their at- by:
n n
tributes, are able to access data stored in the cloud ∑ µi yit = t ∑ µi yi = t.1 = t (30)
while successfully authentication with the cloud i=1 i=1
server. This is due to the correctness of our encryp-
tion and signature algorithms and the compliance of
the unforgeability property of the PAbAC signature Theorem 4. Unauthorized entities are unable to ac-
scheme inherited from (Waters, 2005). cess the outsourced data files
Lemma 6. PAbAC is secure against the collusion at- produces two different messages mα and mβ respec-
tack. tively. Consequently, a malicious user cannot gen-
erate a valid signature if he attempts a replay attack
Proof. We recall that the unforgeability property en- based on collected data from two different authenti-
sures that even if requesting users collude and com- cation sessions.
bine their attributes together, they cannot forge a sig-
nature that opens to a signer whose attributes do
not satisfy the access policy. It also covers non-
frameability and ensures that even if requesting users 7 PERFORMANCE ANALYSIS
collude, they cannot frame a user who did not produce
the signature. Similarly, malicious users cannot col- In this section, we present the computation and stor-
lude to decipher an encrypted data file if the attributes age complexities of the PAbAC protocol at both the
of each individual user do not satisfy the access pol- client and cloud provider sides. For this purpose,
icy, defined by the data owner. we are interested by the computations performed at
Let us consider two malicious users UA and UB hav- the data owner side in order to execute the STORE
ing each a set of attributes XA and XB such as XA ∪ XB procedure. Moreover, we will consider the compu-
satisfy the access structure. Suppose that UA gets tation cost related to the execution of the BACKUP
skS1 = (K1 , L1 , Ki1 ) = (g1 α · ht1 , g1 t1 , ui1 t1 ) and UB gets procedure by both the user (U) and the cloud service
skS2 = (K2 , L2 , Ki2 ) = (g1 α · ht2 , g1 t2 , ui2 t2 ). The users provider (CSP).
collude to create a valid set of attributes and derive a In the following, we denote by:
secret key skS1∪2 = skS1 ∪ skS2 from the combination
• E1 : exponentiation in G1
of the two user’s keys. Then, the colluded malicious
users try to decrypt the data as follows: • E : exponentiation in GT
C1,i ê(L,C3,i ) • τP : computation of a pairing function ê
= (31)
ê(LKi ,C2,i ) Table 2 details the performance comparison with most
closely related data sharing schemes in cloud environ-
ê(g1 , g1 )λi ê(g1 t1 +t2 , g1 pi )ê(g1 t1 +t2 , g1 wi )ê(g1 t1 +t2 , u1 pi ) ments.
ê(ui1 t1 ui2 t2 , g1 pi )ê(g1 t1 +t2 , g1 pi ) The STORE procedure consists of performing the
(32) encryption algorithm encdata. During this proce-
Afterwards, the equation (12) cannot be resolved as dure, the data owner has to encrypt the data file.
detailed in (32). Thus, the malicious users can not As such, he calculates one pairing function ê(g1 , g1 )
recover the original data. and nE exponentiations in G to compute each of C1,i
where n is the number of attributes. In addition, the
Lemma 7. The CSP is unable to access the encrypted data owner executes 4n exponentiations in G1 to cal-
data files culate C2,i and C3,i .
Proof. The CSP cannot decipher encrypted data be- The BACKUP procedure is made up three algorithms
cause it does not possess the secret keys {skS j }, re- verif executed by the CSP and sign and decdata
quired for satisfying the access policy defined by the runned by the data user (U). The user first signs a ran-
data owner. Even if the cloud provider colludes with dom message in order to authenticate with the cloud.
other unauthorized users, it cannot decrypt data, since To sign the message, the user performs 2(n + 1) expo-
the PAbAC scheme is collusion resistant as detailed nentiations in G1 . Then, this latter executes 2n pairing
in Section 6.4. Moreover, we suppose that the at- to calculate ê(L),C3,i ) and ê(Ki · L,C2,i ) to decrypt the
tribute authorities AAs are not hosted by the CSP. data file. In the verification phase, the CSP executes
Thus, even if some attribute authorities are compro- the verif algorithm. As such, the cloud provider
mised, the CSP cannot decipher data. performs (n + 2) pairing functions’ computations and
n + 1 exponentiations in G1 .
Lemma 8. PAbAC is resistant to replay attacks. The existent access control schemes (Ruj et al., 2012),
(Ruj et al., 2011), (Ruj et al., 2014) are based on
Proof. In our proposed PAbAC signature scheme, the the Lewko’s decentralized attribute based encryption
message m, sent by the CSP to the requesting user, scheme (Lewko and Waters, 2011). During the en-
is assumed to be different in each authentication ses- cryption phase, the data owner has to perform one
sion (i.e; m presents the cloud provider’s identity con- pairing function ê(g1 , g1 ) and 2n exponentiations in
catenated with the current time). In fact, for two GT to calculate each of C1,i . In addition, to calculate
different authentication sessions α and β, the CSP C2,i and C3,i , the data owner performs 3n in G1 . In the
Table 2: Performances Comparison for Different Access Control Mechanisms in Cloud Data Storage Environments

Scheme Data Owner Comp. CSP Comp. User comp.


(Zhao et al., 2011) E + (2n + 1)E1 τP (3 + 2n) + (2nl + 1)E1 (2 + 3n + 2nl)E1 + (2n +
1)τP + (n + 1)E
(Ruj et al., 2012) 3nE1 + (2n + 1)E + τP τP (3 + 2n) + (2nl + 1)E1 (2 + 3n + 2nl)E1 + 2nτP +
nE
(Ruj et al., 2011) 3nE1 + (2n + 1)E + τP −− 2nτP + nE
(Ruj et al., 2014) 3nE1 + (2n + 1)E + τP τP (3 + 2n) + (2nl + 1)E1 (2 + 3n + 2nl)E1 + 2nτP +
nE
PAbAC (n + 1)E + 4nE1 + τP (2 + n)τP + (n + 1)E1 2(n + 1)E1 + 2nτP + nE

data decryption phase, the data user performs n expo- ACKNOWLEDGEMENTS


nentiations in GT and 2n pairing functions.
The zhao et al.’s proposal (Zhao et al., 2011) is This work is a part of the MOBIDOC project achieved
based on the use of the CP-ABE scheme proposed under the PASRI program, funded by the European
by Bethencourt et al. (Bethencourt et al., 2007). Union and administered by the ANPR.
To encrypt the data file, the data owner performs
(2n + 1) exponentiations in G1 and one exponentia-
tion in GT . The user while decrypting data performs
n + 1 exponentiations in GT and 2n + 1 pairing func- REFERENCES
tions. The proposals (Ruj et al., 2012),(Zhao et al.,
2011), (Ruj et al., 2014) are based on the use of the Health Insurance Portability and Accountability Act
attribute based signature scheme proposed by (Maji (HIPAA). https://www.hipaa.com/about/.
et al., 2011). In order to sign the message, the user Beimel, A. (1996). Secure schemes for secret sharing and
performs 2 + 3n + 2nl exponentiations in G1 , where key distribution. PhD thesis, Technion-Israel Institute
of technology, Faculty of computer science.
n is the number of rows of the access matrix A and l
presents the number of columns of A. In the verifi- Benaloh, J., Chase, M., Horvitz, E., and Lauter, K. (2009).
Patient controlled encryption: ensuring privacy of
cation phase, the CSP has to perform 3 + 2n pairing electronic medical records. In The 2009 ACM work-
function and 2nl + 1 exponentiations in G1 . shop on Cloud computing security, pages 103–114.
ACM.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In IEEE
Symposium on Security and Privacy, 2007., pages
321–334.
8 CONCLUSIONS
Bobba, R., Fatemieh, O., Khan, F., Gunter, C., Khurana,
H., et al. (2006). Using attribute-based access con-
trol to enable attribute-based messaging. In The 22nd
Annual Computer Security Applications Conference,
The growing need for secure cloud sharing services pages 403–413. IEEE.
and the attractive properties of the Attribute based Chaum, D. and Van Heyst, E. (1991). Group signatures. In
Cryptography lead us to combine them, thus, defining Advances in CryptologyEUROCRYPT91, pages 257–
an innovative solution to the data outsourcing security 265. Springer.
and efficiency issues. Di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi,
In this paper, we design a privacy preserving attribute S., Pelosi, G., and Samarati, P. (2010a). Encryption-
based framework for fine grained access control, for based policy enforcement for cloud storage. In Dis-
dynamic groups in untrusted cloud storage environ- tributed Computing Systems Workshops (ICDCSW),
ments. Our approach ensures the confidentiality of 2010 IEEE 30th International Conference on, pages
42–51. IEEE.
outsourced data in public untrusted cloud servers and
defines efficient data sharing in dynamic groups. That Di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi,
S., and Samarati, P. (2007). Over-encryption: man-
is, flexible access control policies are enforced among agement of access control evolution on outsourced
users belonging to separate groups with different priv- data. In Proceedings of the 33rd international confer-
ileges. Our theoretical performances analysis shows ence on Very large data bases, pages 123–134. VLDB
the efficiency of PAbAC in scalable data sharing, endowment.
while considering the impact of the cryptographic op- Di Vimercati, S. D. C., Foresti, S., Livraga, G., and Sama-
erations at both the client and the cloud provider side. rati, P. (2015). Selective and private access to out-
sourced data centers. In Handbook on Data Centers, Okamoto, T. and Takashima, K. (2013). Decen-
pages 997–1027. Springer. tralized attribute-based signatures. In Public-Key
Di Vimercati, S. D. C. D., Foresti, S., Jajodia, S., Para- Cryptography–PKC 2013, pages 125–142. Springer.
boschi, S., and Samarati, P. (2010b). Encryption poli- Raykova, M., Zhao, H., and Bellovin, S. (2012). Privacy
cies for regulating access to outsourced data. ACM enhanced access control for outsourced data sharing.
Transactions on Database Systems (TODS), 35(2):12. In Financial Cryptography and Data Security, volume
El Kaafarani, A., Chen, L., Ghadafi, E., and Davenport, 7397, pages 223–238.
J. (2014a). Attribute-based signatures with user- Rivest, R. L., Shamir, A., and Tauman, Y. (2001). How to
controlled linkability. In Cryptology and Network Se- leak a secret. In Advances in CryptologyASIACRYPT
curity, pages 256–269. Springer. 2001, pages 552–565. Springer.
El Kaafarani, A., Ghadafi, E., and Khader, D. (2014b). Ruj, S., Nayak, A., and Stojmenovic, I. (2011). Dacc: Dis-
Decentralized traceable attribute-based signatures. In tributed access control in clouds. In IEEE 10th Inter-
Topics in Cryptology–CT-RSA 2014, pages 327–348. national Conference on Trust, Security and Privacy in
Springer. Computing and Communications (TrustCom), pages
Frikken, K. B., Li, J., and Atallah, M. J. (2006). Trust ne- 91–98.
gotiation with hidden credentials, hidden policies, and Ruj, S., Stojmenovic, M., and Nayak, A. (2012). Privacy
policy cycles. In NDSS. Citeseer. preserving access control with authentication for se-
Ghadafi, E. (2015). Stronger security notions for decen- curing data in clouds. In The 12th IEEE/ACM Inter-
tralized traceable attribute-based signatures and more national Symposium on Cluster, Cloud and Grid Com-
efficient constructions. In Topics in Cryptology—CT- puting (CCGrid), 2012, pages 556–563. IEEE.
RSA 2015, pages 391–409. Springer. Ruj, S., Stojmenovic, M., and Nayak, A. (2014). Decentral-
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006). ized access control with anonymous authentication of
Attribute-based encryption for fine-grained access data stored in clouds. IEEE Transactions on Parallel
control of encrypted data. In The 13th ACM con- and Distributed Systems, 25(2):384–394.
ference on Computer and communications security, Sahai, A. and Waters, B. (2005). Fuzzy identity-based
pages 89–98. encryption. In EUROCRYPT 2005, pages 457–473.
Horváth, M. (2015). Attribute-based encryption optimized Springer.
for cloud computing. In SOFSEM 2015: Theory Wan, Z., Liu, J. E., and Deng, R. H. (2012). Hasbe: a hierar-
and Practice of Computer Science, pages 566–577. chical attribute-based solution for flexible and scalable
Springer. access control in cloud computing. IEEE Transactions
Horwitz, J. and Lynn, B. (2002). Toward hierarchical on Information Forensics and Security, 7(2):743–754.
identity-based encryption. In Advances in Cryptolo- Wang, G., Liu, Q., and Wu, J. (2010). Hierarchical attribute-
gyEUROCRYPT 2002, pages 466–481. Springer. based encryption for fine-grained access control in
Hur, J. and Noh, D. K. (2011). Attribute-based access con- cloud storage services. In The 17th ACM conference
trol with efficient revocation in data outsourcing sys- on Computer and communications security, pages
tems. IEEE Transactions on Parallel and Distributed 735–737. ACM.
Systems, 22(7):1214–1221. Wang, W., Li, Z., Owens, R., and Bhargava, B. (2009). Se-
Jahid, S., Mittal, P., and Borisov, N. (2011). Easier: cure and efficient access to outsourced data. In The
Encryption-based access control in social networks 2009 ACM workshop on Cloud computing security,
with efficient revocation. In The 6th ACM Symposium pages 55–66. ACM.
on Information, Computer and Communications Se- Waters, B. (2005). Efficient identity-based encryption with-
curity, pages 411–415. ACM. out random oracles. In Advances in Cryptology–
Kaaniche, N., Boudguiga, A., and Laurent, M. (2013). Id EUROCRYPT 2005, pages 114–127. Springer.
based cryptography for cloud data storage. In 2013 Yu, S., Wang, C., Ren, K., and Lou, W. (2010a). Achieving
IEEE Sixth International Conference on Cloud Com- secure, scalable, and fine-grained data access control
puting, pages 375–382. IEEE. in cloud computing. In INFOCOM IEEE Proceedings
Kaaniche, N., Laurent, M., and El Barbori, M. (2014). 2010, pages 1–9.
Cloudasec: A novel publickey based framework to Yu, S., Wang, C., Ren, K., and Lou, W. (2010b). Attribute
handle data sharing security in clouds. In 11th IEEE based data sharing with attribute revocation. In The
International Conference on Security and Cryptogra- 5th ACM Symposium on Information, Computer and
phy(Secrypt). Communications Security, pages 261–270.
Karchmer, M. and Wigderson, A. (1993). On span pro- Zhao, F., Nishide, T., and Sakurai, K. (2011). Realizing
grams. In Structure in Complexity Theory Conference, fine-grained and flexible access control to outsourced
pages 102–111. data with attribute-based cryptosystems. In Informa-
Lewko, A. and Waters, B. (2011). Decentralizing attribute- tion Security Practice and Experience, pages 83–97.
based encryption. In Advances in Cryptology– Springer.
EUROCRYPT 2011, pages 568–588. Springer. Zunnurhain, K. (2012). Fapa: a model to prevent flooding
Maji, H. K., Prabhakaran, M., and Rosulek, M. (2011). attacks in clouds. In The 50th Annual Southeast Re-
Attribute-based signatures. In Topics in Cryptology– gional Conference, pages 395–396. ACM.
CT-RSA 2011, pages 376–392. Springer.

Potrebbero piacerti anche