Realizing Fine-Grained and
Flexible Access Control to
Outsourced Data with
Attribute-Based Cryptosystems
Fangming Zhao, Takashi Nishide, and Kouichi Sakurai
International Conference on Information Security Practice and Experience
Ghuangzhou, China, May 2011
SWIM Seminar
March 9, 2016
Mateus Cruz
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
BACKGROUND
Outsourcing of data storage
Cloud storage
Privacy concerns
Untrusted server
Encrypt data before uploading
Access controlled by keys
1 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
CONTRIBUTIONS
Flexible and fine-grained access control
read-only and read-write differentiation
Data confidentiality
Lower cost of key distribution
Integrity verification
2 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SECURITY ASSUMPTIONS
Semi-trusted storage servers
Tries to obtain information
Does not tamper with the data
Trusted attribute authority (TA)
Manage attributes and related keys
Users
Readers (read-only)
Writers (read-write)
Can collude to obtain more information
3 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SYSTEM OVERVIEW
4 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ATTRIBUTE-BASED ENCRYPTION
Private key associated with attributes
Access tree Tdecrypt
Defines access policies over attributes
Encrypt using access structure
Decrypt if structure is satisfied
Example
“Directors or managers or
a specifically appointed
person (trustee) can
access the data”
5 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ATTRIBUTE-BASED SIGNATURE
Users can sign resources
Signatures are based on users’ attributes
Users verify signatures
Example
“Only director-manager
users or a specifically
appointed person (trustee)
can access the data”
6 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
DATA ACCESS PROCEDURES
Create file
Encrypt phase
Sign phase
Upload phase
Read file
Verify phase
Decrypt phase
Update file
7 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
CREATE FILE
Encrypt phase
Sign phase
Upload phase
8 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ENCRYPT PHASE
The owner encrypts a file for sharing
Based on ABE
Decryption policy based on the tree Tdecrypt
CT = Enc(PKE, M, Tdecrypt)
Notation Description
CT: ciphertext
Enc: encryption algorithm
PKE: public key for encryption
M: message
Tdecrypt: access tree
9 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SIGN PHASE
The owner signs the ciphertext using ABS
Used to differentiate readers and writers
SG = Sign(PKS, SKS, h(CT)||t, Tsign)
Notation Description
SG: signature
Sign: sign algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
10 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
UPLOAD PHASE
The owner uploads CT, SG, t
The server checks signature
Accept or reject upload
R0 = Verify(PKS, h(CT)||t, Tsign, SG)
Notation Description
R0: boolean verification value
Verify: verification algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
SG: signature
11 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
READ FILE
Verify phase
Decrypt phase
12 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
VERIFY PHASE
A user obtains CT, SG, t, Tsign
Obtain public key PKS from trusted authority
Verifies if the signature is valid
R1 = Verify(PKS, h(CT)||t, Tsign, SG)
Notation Description
R1: boolean verification value
Verify: verification algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
SG: signature
13 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
DECRYPT PHASE
Decrypts ciphertext using SKU
M = Decrypt(CT, SKU)
Notation Description
M: message
Decrypt: decryption algorithm
CT: ciphertext
SKU: key corresponding to attributes U
14 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
UPDATE FILE
A user...
Updates M to M1
Encrypts message:
CT1 = Enc(PKE , M1, Tdecrypt1
)
Signs ciphertext:
SG1 = Sign(PKS, SKS, h(CT1)||t1, Tsign)
Uploads CT1, SG1, t1, Tsign
The server...
Verifies the new signature
– Check writer’s attributes
Accepts or rejects the update
15 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
WRITER-READER DIFFERENTIATION
Users differentiated by ABS
Writers can produce a valid signature
Differentiation done at attribute level
Scales better than at user level
16 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
INTEGRITY
ABS offers integrity
Hash ciphertext before signing
The integrity can be verified by...
Server
Valid users
17 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
COMPUTATIONAL OVERHEAD
Create and Update
One encryption operation
One sign operation
Cost grows with access structure matrix
Read
One decryption operation
One verify operation
Cost grows with attributes satisfied
Cost mainly generated by pairing computations
18 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SUMMARY
Secure data sharing scheme
Fine-grained access
Many-read-many-write
Integrity verification
19 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
FUTURE WORK
Use search on encrypted data
Many-read-many-write-many-search
Implementation to verify usability
20 / 21
Detailed Analysis
EXTRA SLIDES
Detailed Analysis
COMPLEXITY ANALYSIS
Create file
O(E1 × log p) + O(l × E0 × log p)
Read file
O(l ×L)+O(|U|×E1 ×log p)+O(l ×E0 ×log p)
Update file
O(E1 × log p) + O(l × E0 × log p)
Notation Description
E0 Cost of exponentiation operations in G0
E1 Cost of exponentiation operations in G1
L Cost of bilinear pairing
p Prime order of G0 and G1
U The attribute set in the access tree
l, t The matrix l × t of the monotone span program which is con-
verted from its corresponding access structure

More Related Content

PDF
ENKI: Access Control for Encrypted Query Processing
PDF
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
PDF
DBMask: Fine-Grained Access Control on Encrypted Relational Databases
PDF
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
PDF
Overview of CryptDB
PDF
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
PDF
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
PDF
Privacy-Preserving Search for Chemical Compound Databases
ENKI: Access Control for Encrypted Query Processing
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
DBMask: Fine-Grained Access Control on Encrypted Relational Databases
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Overview of CryptDB
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Privacy-Preserving Search for Chemical Compound Databases

What's hot (20)

ODP
Klee introduction
PPTX
Symbolic Execution And KLEE
PDF
Analysis of a Modified RC4
PDF
An effective RC4 Stream Cipher
PPTX
Homomorphic encryption and Private Machine Learning Classification
PDF
Cs8792 cns - Public key cryptosystem (Unit III)
PDF
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
PPT
Code Tuning
PDF
Notes: Verilog Part 4- Behavioural Modelling
PDF
Parallel program design
PDF
EKON 12 Closures Coding
PDF
Generating Predicate Callback Summaries for the Android Framework
PDF
Use of an Oscilloscope - maXbox Starter33
PDF
Cryptography Workbook
PDF
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
PDF
A closure ekon16
PPTX
Network Socket Programming with JAVA
PPT
Clanguage
PPT
Behavioral modeling
PDF
Metrics ekon 14_2_kleiner
Klee introduction
Symbolic Execution And KLEE
Analysis of a Modified RC4
An effective RC4 Stream Cipher
Homomorphic encryption and Private Machine Learning Classification
Cs8792 cns - Public key cryptosystem (Unit III)
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Code Tuning
Notes: Verilog Part 4- Behavioural Modelling
Parallel program design
EKON 12 Closures Coding
Generating Predicate Callback Summaries for the Android Framework
Use of an Oscilloscope - maXbox Starter33
Cryptography Workbook
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
A closure ekon16
Network Socket Programming with JAVA
Clanguage
Behavioral modeling
Metrics ekon 14_2_kleiner
Ad

Viewers also liked (17)

PDF
Overview of MONOMI
PDF
Helib
PPTX
Soil Management, Site Selection. Soil Fertility
PPTX
The molecular times
PPS
The price of_children
PPT
DOC
Sat -mrphong12
PDF
Cau chuyen hoa hoc (phan 2)
PDF
الفنادق الشبكات الاجتماعيه
PPT
Fiscale aspecten - Guus Ottenheijm
PPT
Externe veiligheid en het ruimtelijk planproces (3) 1
PPTX
Agenda 02th may new
KEY
Using Backbone with CakePHP
DOCX
The little ice age
PDF
Programa eco
DOCX
етичний кодекс лікаря україни
Overview of MONOMI
Helib
Soil Management, Site Selection. Soil Fertility
The molecular times
The price of_children
Sat -mrphong12
Cau chuyen hoa hoc (phan 2)
الفنادق الشبكات الاجتماعيه
Fiscale aspecten - Guus Ottenheijm
Externe veiligheid en het ruimtelijk planproces (3) 1
Agenda 02th may new
Using Backbone with CakePHP
The little ice age
Programa eco
етичний кодекс лікаря україни
Ad

Similar to Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems (20)

PPT
WLAN and IP security
PDF
Shedding Light on LINE Token Economy You Won't Find in Our White Paper
PDF
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
PDF
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
PPTX
A10 presentation for LB GLB for ADC solutions
PDF
Findings in clus 2019
PPT
Verilog HDL Verification
PDF
ArcSight Logger Forwarding Connector for HP Network Node Manager i
PDF
CNCF Singapore - Introduction to Envoy
PPTX
batch-4.pptx
PDF
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
PPT
ALOE Transit SBC rev.1 Presentation
PPTX
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
PPTX
The Impact of Digital Transformation on Enterprise Security
PPTX
Play framework : A Walkthrough
PPTX
CCNP Switching Chapter 7
PPT
High Performance Communication for Oracle using InfiniBand
DOCX
Profile_Prateek
DOCX
 Test system architectures using advanced standardized test languages
PDF
Verification Strategy for PCI-Express
WLAN and IP security
Shedding Light on LINE Token Economy You Won't Find in Our White Paper
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
A10 presentation for LB GLB for ADC solutions
Findings in clus 2019
Verilog HDL Verification
ArcSight Logger Forwarding Connector for HP Network Node Manager i
CNCF Singapore - Introduction to Envoy
batch-4.pptx
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
ALOE Transit SBC rev.1 Presentation
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
The Impact of Digital Transformation on Enterprise Security
Play framework : A Walkthrough
CCNP Switching Chapter 7
High Performance Communication for Oracle using InfiniBand
Profile_Prateek
 Test system architectures using advanced standardized test languages
Verification Strategy for PCI-Express

Recently uploaded (20)

PPT
12 Things That Make People Trust a Website Instantly
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PDF
Containerization lab dddddddddddddddmanual.pdf
PPTX
Artificial_Intelligence_Basics use in our daily life
PDF
Exploring The Internet Of Things(IOT).ppt
PDF
Understand the Gitlab_presentation_task.pdf
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPSX
AI AppSec Threats and Defenses 20250822.ppsx
PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PPTX
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
Internet Safety for Seniors presentation
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPTX
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
PDF
simpleintnettestmetiaerl for the simple testint
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
12 Things That Make People Trust a Website Instantly
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
Containerization lab dddddddddddddddmanual.pdf
Artificial_Intelligence_Basics use in our daily life
Exploring The Internet Of Things(IOT).ppt
Understand the Gitlab_presentation_task.pdf
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
AI AppSec Threats and Defenses 20250822.ppsx
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
Viva Digitally Software-Defined Wide Area Network.pptx
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Internet Safety for Seniors presentation
Layers_of_the_Earth_Grade7.pptx class by
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
simpleintnettestmetiaerl for the simple testint
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
AI_Cyberattack_Solutions AI AI AI AI .pptx
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx

Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems

  • 1. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems Fangming Zhao, Takashi Nishide, and Kouichi Sakurai International Conference on Information Security Practice and Experience Ghuangzhou, China, May 2011 SWIM Seminar March 9, 2016 Mateus Cruz
  • 2. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 3. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 4. Introduction ABE/ABS Proposal Performance Analysis Conclusion BACKGROUND Outsourcing of data storage Cloud storage Privacy concerns Untrusted server Encrypt data before uploading Access controlled by keys 1 / 21
  • 5. Introduction ABE/ABS Proposal Performance Analysis Conclusion CONTRIBUTIONS Flexible and fine-grained access control read-only and read-write differentiation Data confidentiality Lower cost of key distribution Integrity verification 2 / 21
  • 6. Introduction ABE/ABS Proposal Performance Analysis Conclusion SECURITY ASSUMPTIONS Semi-trusted storage servers Tries to obtain information Does not tamper with the data Trusted attribute authority (TA) Manage attributes and related keys Users Readers (read-only) Writers (read-write) Can collude to obtain more information 3 / 21
  • 7. Introduction ABE/ABS Proposal Performance Analysis Conclusion SYSTEM OVERVIEW 4 / 21
  • 8. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 9. Introduction ABE/ABS Proposal Performance Analysis Conclusion ATTRIBUTE-BASED ENCRYPTION Private key associated with attributes Access tree Tdecrypt Defines access policies over attributes Encrypt using access structure Decrypt if structure is satisfied Example “Directors or managers or a specifically appointed person (trustee) can access the data” 5 / 21
  • 10. Introduction ABE/ABS Proposal Performance Analysis Conclusion ATTRIBUTE-BASED SIGNATURE Users can sign resources Signatures are based on users’ attributes Users verify signatures Example “Only director-manager users or a specifically appointed person (trustee) can access the data” 6 / 21
  • 11. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 12. Introduction ABE/ABS Proposal Performance Analysis Conclusion DATA ACCESS PROCEDURES Create file Encrypt phase Sign phase Upload phase Read file Verify phase Decrypt phase Update file 7 / 21
  • 13. Introduction ABE/ABS Proposal Performance Analysis Conclusion CREATE FILE Encrypt phase Sign phase Upload phase 8 / 21
  • 14. Introduction ABE/ABS Proposal Performance Analysis Conclusion ENCRYPT PHASE The owner encrypts a file for sharing Based on ABE Decryption policy based on the tree Tdecrypt CT = Enc(PKE, M, Tdecrypt) Notation Description CT: ciphertext Enc: encryption algorithm PKE: public key for encryption M: message Tdecrypt: access tree 9 / 21
  • 15. Introduction ABE/ABS Proposal Performance Analysis Conclusion SIGN PHASE The owner signs the ciphertext using ABS Used to differentiate readers and writers SG = Sign(PKS, SKS, h(CT)||t, Tsign) Notation Description SG: signature Sign: sign algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree 10 / 21
  • 16. Introduction ABE/ABS Proposal Performance Analysis Conclusion UPLOAD PHASE The owner uploads CT, SG, t The server checks signature Accept or reject upload R0 = Verify(PKS, h(CT)||t, Tsign, SG) Notation Description R0: boolean verification value Verify: verification algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree SG: signature 11 / 21
  • 17. Introduction ABE/ABS Proposal Performance Analysis Conclusion READ FILE Verify phase Decrypt phase 12 / 21
  • 18. Introduction ABE/ABS Proposal Performance Analysis Conclusion VERIFY PHASE A user obtains CT, SG, t, Tsign Obtain public key PKS from trusted authority Verifies if the signature is valid R1 = Verify(PKS, h(CT)||t, Tsign, SG) Notation Description R1: boolean verification value Verify: verification algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree SG: signature 13 / 21
  • 19. Introduction ABE/ABS Proposal Performance Analysis Conclusion DECRYPT PHASE Decrypts ciphertext using SKU M = Decrypt(CT, SKU) Notation Description M: message Decrypt: decryption algorithm CT: ciphertext SKU: key corresponding to attributes U 14 / 21
  • 20. Introduction ABE/ABS Proposal Performance Analysis Conclusion UPDATE FILE A user... Updates M to M1 Encrypts message: CT1 = Enc(PKE , M1, Tdecrypt1 ) Signs ciphertext: SG1 = Sign(PKS, SKS, h(CT1)||t1, Tsign) Uploads CT1, SG1, t1, Tsign The server... Verifies the new signature – Check writer’s attributes Accepts or rejects the update 15 / 21
  • 21. Introduction ABE/ABS Proposal Performance Analysis Conclusion WRITER-READER DIFFERENTIATION Users differentiated by ABS Writers can produce a valid signature Differentiation done at attribute level Scales better than at user level 16 / 21
  • 22. Introduction ABE/ABS Proposal Performance Analysis Conclusion INTEGRITY ABS offers integrity Hash ciphertext before signing The integrity can be verified by... Server Valid users 17 / 21
  • 23. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 24. Introduction ABE/ABS Proposal Performance Analysis Conclusion COMPUTATIONAL OVERHEAD Create and Update One encryption operation One sign operation Cost grows with access structure matrix Read One decryption operation One verify operation Cost grows with attributes satisfied Cost mainly generated by pairing computations 18 / 21
  • 25. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 26. Introduction ABE/ABS Proposal Performance Analysis Conclusion SUMMARY Secure data sharing scheme Fine-grained access Many-read-many-write Integrity verification 19 / 21
  • 27. Introduction ABE/ABS Proposal Performance Analysis Conclusion FUTURE WORK Use search on encrypted data Many-read-many-write-many-search Implementation to verify usability 20 / 21
  • 29. Detailed Analysis COMPLEXITY ANALYSIS Create file O(E1 × log p) + O(l × E0 × log p) Read file O(l ×L)+O(|U|×E1 ×log p)+O(l ×E0 ×log p) Update file O(E1 × log p) + O(l × E0 × log p) Notation Description E0 Cost of exponentiation operations in G0 E1 Cost of exponentiation operations in G1 L Cost of bilinear pairing p Prime order of G0 and G1 U The attribute set in the access tree l, t The matrix l × t of the monotone span program which is con- verted from its corresponding access structure