CSCAC

One constant-size CPABE access control scheme in trusted execution environment

Yongkai Fan, Shengle Liu, Gang Tan, Xiaodong Lin

Research output: Contribution to journalArticle

Abstract

The popularity of versatile mobile devices has been increasing concerns about their security. How to protect the sensitive data is an urgent issue to be solved. Ciphertext-policy attribute-based encryption (CPABE) is a practical method for encrypting data and can utilise user's attributes to encrypt the sensitive data. In this paper, we propose a constant-size CPABE access control (CSCAC) model by using the Trusted Execution Environment to manage the dynamic key generated by attributes. The original data is encrypted by a symmetric storage key, then the storage key is encrypted under an AND-gate access policy. Only the user who possesses a set of attributes that satisfy the access policy can recover the storage key. The security analysis shows the design of this access control scheme reduces the burden and risk in the case of one single authority.

Original languageEnglish (US)
Pages (from-to)162-168
Number of pages7
JournalInternational Journal of Computational Science and Engineering
Volume19
Issue number2
DOIs
StatePublished - Jan 1 2019

Fingerprint

Access Control
Access control
Encryption
Cryptography
Attribute
Mobile devices
Security Analysis
Mobile Devices
Policy

All Science Journal Classification (ASJC) codes

  • Software
  • Modeling and Simulation
  • Hardware and Architecture
  • Computational Mathematics
  • Computational Theory and Mathematics

Cite this

@article{b7e211f0ee29480f8cc9fe2a9aeb8163,
title = "CSCAC: One constant-size CPABE access control scheme in trusted execution environment",
abstract = "The popularity of versatile mobile devices has been increasing concerns about their security. How to protect the sensitive data is an urgent issue to be solved. Ciphertext-policy attribute-based encryption (CPABE) is a practical method for encrypting data and can utilise user's attributes to encrypt the sensitive data. In this paper, we propose a constant-size CPABE access control (CSCAC) model by using the Trusted Execution Environment to manage the dynamic key generated by attributes. The original data is encrypted by a symmetric storage key, then the storage key is encrypted under an AND-gate access policy. Only the user who possesses a set of attributes that satisfy the access policy can recover the storage key. The security analysis shows the design of this access control scheme reduces the burden and risk in the case of one single authority.",
author = "Yongkai Fan and Shengle Liu and Gang Tan and Xiaodong Lin",
year = "2019",
month = "1",
day = "1",
doi = "10.1504/IJCSE.2019.100235",
language = "English (US)",
volume = "19",
pages = "162--168",
journal = "International Journal of Computational Science and Engineering",
issn = "1742-7185",
publisher = "Inderscience Enterprises Ltd",
number = "2",

}

CSCAC : One constant-size CPABE access control scheme in trusted execution environment. / Fan, Yongkai; Liu, Shengle; Tan, Gang; Lin, Xiaodong.

In: International Journal of Computational Science and Engineering, Vol. 19, No. 2, 01.01.2019, p. 162-168.

Research output: Contribution to journalArticle

TY - JOUR

T1 - CSCAC

T2 - One constant-size CPABE access control scheme in trusted execution environment

AU - Fan, Yongkai

AU - Liu, Shengle

AU - Tan, Gang

AU - Lin, Xiaodong

PY - 2019/1/1

Y1 - 2019/1/1

N2 - The popularity of versatile mobile devices has been increasing concerns about their security. How to protect the sensitive data is an urgent issue to be solved. Ciphertext-policy attribute-based encryption (CPABE) is a practical method for encrypting data and can utilise user's attributes to encrypt the sensitive data. In this paper, we propose a constant-size CPABE access control (CSCAC) model by using the Trusted Execution Environment to manage the dynamic key generated by attributes. The original data is encrypted by a symmetric storage key, then the storage key is encrypted under an AND-gate access policy. Only the user who possesses a set of attributes that satisfy the access policy can recover the storage key. The security analysis shows the design of this access control scheme reduces the burden and risk in the case of one single authority.

AB - The popularity of versatile mobile devices has been increasing concerns about their security. How to protect the sensitive data is an urgent issue to be solved. Ciphertext-policy attribute-based encryption (CPABE) is a practical method for encrypting data and can utilise user's attributes to encrypt the sensitive data. In this paper, we propose a constant-size CPABE access control (CSCAC) model by using the Trusted Execution Environment to manage the dynamic key generated by attributes. The original data is encrypted by a symmetric storage key, then the storage key is encrypted under an AND-gate access policy. Only the user who possesses a set of attributes that satisfy the access policy can recover the storage key. The security analysis shows the design of this access control scheme reduces the burden and risk in the case of one single authority.

UR - http://www.scopus.com/inward/record.url?scp=85068051283&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85068051283&partnerID=8YFLogxK

U2 - 10.1504/IJCSE.2019.100235

DO - 10.1504/IJCSE.2019.100235

M3 - Article

VL - 19

SP - 162

EP - 168

JO - International Journal of Computational Science and Engineering

JF - International Journal of Computational Science and Engineering

SN - 1742-7185

IS - 2

ER -