Journal on Communications ›› 2014, Vol. 35 ›› Issue (Z2): 53-62.doi: 10.3969/j.issn.1000-436x.2014.z2.009

• Papers • Previous Articles     Next Articles

Privilege separation of data sharing scheme using attribute-based encryption

Hui ZHU,Wan LEI,Rong HUANG,Hui LI,Xi-meng LIU   

  1. State Key Laboratory of Integrated Services Networks,Xidian University,Xi'an 710071,China
  • Online:2014-11-25 Published:2017-06-19
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;Fundamental Research Foundations for the Central Universities of China;The National Mobile Communication Major Project;111 Project

Abstract:

Attribute-based encryption (ABE),which can provide fine-grained access control and flexible one-to-many encryption,has been envisioned as an important data sharing approach to achieve privacy preserving in the distributed environment.However,the flourish of the data sharing approach using attribute-based encryption still hinges upon how to fully understand and manage the challenges facing in the distributed environment,especially the veracity of the data.In fact,all of the existing data sharing schemes allow data owner to modify data without restrictions,in which the veracity of the data has been questioned and that cannot satisfy the demands of practical application sometimes,such as personal electronic medical records or assessment systems.A data sharing scheme with privilege separation is presented,in which the veracity of the data can be ensured and the flexible access control can be provided.Based on RSA-based proxy encryption,a new efficient privilege separation mechanism is introduced to ensure the veracity of the data; exploiting attribute-based encryption,the data owner can define the access policy to achieve fine-grained access control.Detailed security analysis shows that the proposed data sharing scheme can provide the data confidentiality to achieve privacy preserving.In addition,the performance analysis demonstrates the scheme’s effectiveness in terms of the computation costs.

Key words: attribute-based encryption, access control, privilege separation, privacy preserving, data sharing

No Suggested Reading articles found!