You are on page 1of 7

Auditable σ-Time for Access Control in Cloud Computing

Guided by, Renjith Raphy


Mrs. Sakhi S Anand Roll No:13
Professor M2-IS
Overview

• Introduction
• Motivation
• Objectives
• References
Introduction
• Ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising candidates
for cloud computing applications.
• There exist two main long-lasting open problems of CP-ABE that may limit its widely deployment
in commercial applications.
• Decryption yields expensive pairing cost which often grows with the increase of access policy size.
• The other is that one is granted access privilege for unlimited times as long as his attribute set satisfies the access
policy of a given ciphertext.

• The current CP-ABE systems are only designed for unlimited access control over encrypted data.
• Auditable σ -Time Outsourced Attribute-Based Encryption could securely offload a huge part of
decryption to cloud and provides a mechanism that enables an auditor to check the returned
result from the cloud.
Motivation
• Existing online video/music streaming web applications.
• Attribute based encryption.

• Users are allowed only limited access.

• Premium users enjoy indefinite access.

• Naive solution : White and black lists.

• Disadvantages

• Server may know the “access interest”.

• Expensive decryption cost.


Objectives
• To develop a web application that could accommodate online data sharing.
• To integrate σ-time based encryption.
• To reduced decryption overhead at the receiver end and to successfully implement auditing
mechanism at the same.
References

1. Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma, and Lifei Wei. Auditable σ -Time
Outsourced Attribute-Based Encryption for Access Control in Cloud Computing, volume 13 of
IEEE Transactions on Information Forensics and Security, 94−105,2017.
2. Kaitai Liang and Willy Susilo. Searchable attribute-based mechanism with efficient data sharing
for secure cloud storage. IEEE Trans. Information Forensics and Security, 10(9):1981−1992,
2015.
3. Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, and Jian Weng. Generic and efficient
constructions of attribute-based encryption with verifiable outsourced decryption. IEEE
Transactions on Dependable and Secure Computing, 13(5):533–546, 2016.
Thanks!

You might also like