Visible to the public Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation

TitlePractical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
Publication TypeConference Paper
Year of Publication2016
AuthorsDang, Hung, Chong, Yun Long, Brun, Francois, Chang, Ee-Chien
Conference NameProceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4290-2
KeywordsAsymmetric Encryption, attribute based encryption, Cloud Security, Human Behavior, key aggregation cryptosystem, pubcrawl, Resiliency, Scalability, Security and Privacy, Security Heuristics, sensor network, sensor security
Abstract

We study a sensor network setting in which samples are encrypted individually using different keys and maintained on a cloud storage. For large systems, e.g. those that generate several millions of samples per day, fine-grained sharing of encrypted samples is challenging. Existing solutions, such as Attribute-Based Encryption (ABE) and Key Aggregation Cryptosystem (KAC), can be utilized to address the challenge, but only to a certain extent. They are often computationally expensive and thus unlikely to operate at scale. We propose an algorithmic enhancement and two heuristics to improve KAC's key reconstruction cost, while preserving its provable security. The improvement is particularly significant for range and down-sampling queries - accelerating the reconstruction cost from quadratic to linear running time. Experimental study shows that for queries of size 32k samples, the proposed fast reconstruction techniques speed-up the original KAC by at least 90 times on range and down-sampling queries, and by eight times on general (arbitrary) queries. It also shows that at the expense of splitting the query into 16 sub-queries and correspondingly issuing that number of different aggregated keys, reconstruction time can be reduced by 19 times. As such, the proposed techniques make KAC more applicable in practical scenarios such as sensor networks or the Internet of Things.

URLhttp://doi.acm.org/10.1145/2909827.2930795
DOI10.1145/2909827.2930795
Citation Keydang_practical_2016