Professional Documents
Culture Documents
Auditable Σ-Time Outsourced Attribute-Based Encryption for Access Control
Auditable Σ-Time Outsourced Attribute-Based Encryption for Access Control
• Introduction
• Motivation
• Objectives
• References
Introduction
• Ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising candidates
for cloud computing applications.
• There exist two main long-lasting open problems of CP-ABE that may limit its widely deployment
in commercial applications.
• Decryption yields expensive pairing cost which often grows with the increase of access policy size.
• The other is that one is granted access privilege for unlimited times as long as his attribute set satisfies the access
policy of a given ciphertext.
• The current CP-ABE systems are only designed for unlimited access control over encrypted data.
• Auditable σ -Time Outsourced Attribute-Based Encryption could securely offload a huge part of
decryption to cloud and provides a mechanism that enables an auditor to check the returned
result from the cloud.
Motivation
• Existing online video/music streaming web applications.
• Attribute based encryption.
• Disadvantages
1. Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma, and Lifei Wei. Auditable σ -Time
Outsourced Attribute-Based Encryption for Access Control in Cloud Computing, volume 13 of
IEEE Transactions on Information Forensics and Security, 94−105,2017.
2. Kaitai Liang and Willy Susilo. Searchable attribute-based mechanism with efficient data sharing
for secure cloud storage. IEEE Trans. Information Forensics and Security, 10(9):1981−1992,
2015.
3. Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, and Jian Weng. Generic and efficient
constructions of attribute-based encryption with verifiable outsourced decryption. IEEE
Transactions on Dependable and Secure Computing, 13(5):533–546, 2016.
Thanks!