Title | White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively |
Publication Type | Journal Article |
Year of Publication | 2018 |
Authors | Ning, Jianting, Cao, Zhenfu, Dong, Xiaolei, Wei, Lifei |
Journal | IEEE Transactions on Dependable and Secure Computing |
Volume | 15 |
Pagination | 883–897 |
ISSN | 1941-0018 |
Keywords | Access Control, access credentials, authorisation, catch people, ciphertext-policy attribute-based encryption, cloud computing, cloud storage, cloud storage service, commitment, composability, Context, cryptography, Data security, encrypted data, Encryption, fine-grained access control, fully secure traceable CP-ABE system, Law, malicious cloud users, Metrics, original key owner, outsourced data, outsourced data security, outsourcing, pubcrawl, Resiliency, white box cryptography, white-box traceable CP-ABE, white-box traceablity |
Abstract | Ciphertext-policy attribute-based encryption (CP-ABE) has been proposed to enable fine-grained access control on encrypted data for cloud storage service. In the context of CP-ABE, since the decryption privilege is shared by multiple users who have the same attributes, it is difficult to identify the original key owner when given an exposed key. This leaves the malicious cloud users a chance to leak their access credentials to outsourced data in clouds for profits without the risk of being caught, which severely damages data security. To address this problem, we add the property of traceability to the conventional CP-ABE. To catch people leaking their access credentials to outsourced data in clouds for profits effectively, in this paper, we first propose two kinds of non-interactive commitments for traitor tracing. Then we present a fully secure traceable CP-ABE system for cloud storage service from the proposed commitment. Our proposed commitments for traitor tracing may be of independent interest, as they are both pairing-friendly and homomorphic. We also provide extensive experimental results to confirm the feasibility and efficiency of the proposed solution. |
DOI | 10.1109/TDSC.2016.2608343 |
Citation Key | ning_white-box_2018 |