White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

Research output: Contribution to journalArticlepeer-review

111 Scopus citations

Abstract

Ciphertext-policy attribute-based encryption (CP-ABE) has been proposed to enable fine-grained access control on encrypted data for cloud storage service. In the context of CP-ABE, since the decryption privilege is shared by multiple users who have the same attributes, it is difficult to identify the original key owner when given an exposed key. This leaves the malicious cloud users a chance to leak their access credentials to outsourced data in clouds for profits without the risk of being caught, which severely damages data security. To address this problem, we add the property of traceability to the conventional CP-ABE. To catch people leaking their access credentials to outsourced data in clouds for profits effectively, in this paper, we first propose two kinds of non-interactive commitments for traitor tracing. Then we present a fully secure traceable CP-ABE system for cloud storage service from the proposed commitment. Our proposed commitments for traitor tracing may be of independent interest, as they are both pairing-friendly and homomorphic. We also provide extensive experimental results to confirm the feasibility and efficiency of the proposed solution.

Original languageEnglish
Article number7564443
Pages (from-to)883-897
Number of pages15
JournalIEEE Transactions on Dependable and Secure Computing
Volume15
Issue number5
DOIs
StatePublished - 1 Sep 2018

Keywords

  • Ciphertext-policy attribute-based encryption
  • cloud storage
  • commitment
  • outsourced data security
  • white-box traceablity

Fingerprint

Dive into the research topics of 'White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively'. Together they form a unique fingerprint.

Cite this