Browse > Article
http://dx.doi.org/10.9723/jksiis.2014.19.1.001

Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme  

Sadikin, Rifki (School of Electrical Engineering and Computer Science, Kyungpook National University)
Park, Young Ho (Department of Electronics Engineering, Kyungpook National University)
Park, Kil Houm (School of Electronics Engineering, Kyungpook National University)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.19, no.1, 2014 , pp. 1-12 More about this Journal
Abstract
An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured by encrypting it with encryption algorithm from the CP-ABE scheme parameterized by an access control policy. Furthermore, the proposed access control supports non-monotone type access control policy. The ciphertext only can be recovered by users whose attributes satisfy the access control policy. We also implement and measure the performance of our proposed access control. The results of experiments show that our proposed secure access control is feasible.
Keywords
ciphertext-policy attribute-based encryption; public key encryption; access control;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 S. Mazgon (Editor), "Approved ITU-T Security Definition", Security Compendium, ITU-T, 2005
2 R. S. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman, "Role-Based Access Control Models", Computer, vol. 29, no. 2, pp. 38-47, 1996.
3 Keith Frikken, Mikhail Atallah, Jiangtao Li, "Attribute-Based Access Control with Hidden Policies and Hidden Credentials", IEEE Transaction on Computers, vol. 55, no. 10, pp. 1259-1270, 2006.   DOI   ScienceOn
4 Rifki Sadikin, YoungHo Park, KilHoum Park, and SangJae Moon "Universal Composability Notion for Functional Encryption Schemes," Journal of the Korea Society of Industrial Information Systems, vol.18, no.3, pp.17-26, 2013.   과학기술학회마을   DOI   ScienceOn
5 Amit Sahai, and Brent Waters. "Fuzzy identity-based encryption." Advances in Cryptology-EUROCRYPT 2005. pp. 457-473, 2005.
6 J. Bethencourt, Amit Sahai, and Brent Waters. "Ciphertext-policy attribute-based encryption." Security and Privacy, IEEE Symposium, 2007.
7 V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II, ICALP '08, pp. 579-591, 2008.
8 Allison Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption.", Advances in Cryptology-EUROCRYPT 2010. pp. 62-91, 2010.
9 B. Waters, "Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization," in Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography, pp. 53-70, 2011.
10 B. Waters. "Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions." Advances in Cryptology-CRYPTO 2009. pp. 619-626, 2009.
11 Allison Lewko and Brent Waters. "New techniques for dual system encryption and fully secure HIBE with short ciphertexts." Theory of Cryptography. Springer Berlin Heidelberg, pp. 455-479, 2010.
12 Ben Lynn, On the Implementation of Pairing-Based Cryptography, Phd Thesis, Department of Computer Science, Stanford University, USA, 2007.
13 A. Beimel, Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, 1996.
14 L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, "Efficient and provable secure ciphertext-policy attribute-based encryption schemes," in Proceedings of the 5th International Conference on Information Security Practice and Experience, pp. 1-12, 2009.
15 L. Cheung and C. Newport, "Provably secure ciphertext policy ABE," in Proceedings of the 14th ACM conference on Computer and communications security, pp. 456-465, 2007.
16 T. Okamoto and K. Takashima, "Fully secure functional encryption with general relations from the decisional linear assumption," in Advances in Cryptology CRYPTO 2010, pp. 191-208, 2010.
17 Dan Boneh, Amit Sahai, and Brent Waters. "Functional encryption: Definitions and challenges." Theory of Cryptography. Springer Berlin Heidelberg, pp. 253-273, 2011.
18 C. Marshall and R S Naffah, Programming with GNU Crypto, The Free Software Foundation, 2003.
19 J. Benaloh and J. Leichter, "Generalized secret sharing and monotone functions," in Proceedings on Advances in cryptology, CRYPTO '88, pp. 27-35, 1990.
20 M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, "Secure attribute-based systems.", Proceedings of the 13th ACM conference on Computer and communications security, pp. 99-112, 2006.
21 T. Granlund, GNU MP: The GNU Multiple Precision Arithmetic Library, The Free Software Foundation, 2013.