earticle

논문검색

Multiparty Access Control of Ciphertext Sharing in Cloud-Based Online Social Networks

초록

영어

Although current online social networks (OSNs) schemes propose to encrypt data before sharing, the enforcement of access policies over encrypted data has become a challenging task, and the OSNs currently do not provide any mechanism to allow users to update access policies. In this paper, we propose a ciphertext sharing scheme in cloud-based OSNs, which allows the users to outsource encrypted data to the OSNs service provider for sharing. In order to meet the authorization requirement, we present a multiparty access control model based on ciphertext-policy attribute-based proxy re-encryption, which enables the access control of encrypted data associated with multiple users. On the basis of ciphertext-policy attribute-based encryption, the owners can customize the access policy of their own data. Based on proxy re-encryption, the disseminators such as friends and group members can further customize the access policy of the owners’ data upon existing access policy. Besides, we achieve immediate user revocation based on secret sharing without issuing new attribute secret keys to unrevoked users. The security and performance analysis show that our proposed scheme is secure, efficient and practical.

목차

Abstract
 1. Introduction
 2. Related Work
 3. Preliminaries
  3.1. Bilinear Map
  3.2. Secret Sharing
  3.3. Ciphertext-policy Attribute-Based Proxy Re-encryption
 4. Overview of Proposed Scheme
  4.1. Security Model
  4.2. System Model
 5. Construction
 6. User Revocation
 7. Security and Performance Analysis
  7.1. Security Analysis
  7.2. Performance Analysis
  7.3. Comparison
 8. Conclusions
 References

저자정보

  • Huang Qinlong Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China, National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China
  • Ma Zhaofeng Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China, National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China
  • Yang Yixian Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China, National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China
  • Niu Xinxin Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China, National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.