SlideShare a Scribd company logo
Realizing Fine-Grained and
Flexible Access Control to
Outsourced Data with
Attribute-Based Cryptosystems
Fangming Zhao, Takashi Nishide, and Kouichi Sakurai
International Conference on Information Security Practice and Experience
Ghuangzhou, China, May 2011
SWIM Seminar
March 9, 2016
Mateus Cruz
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
BACKGROUND
Outsourcing of data storage
Cloud storage
Privacy concerns
Untrusted server
Encrypt data before uploading
Access controlled by keys
1 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
CONTRIBUTIONS
Flexible and fine-grained access control
read-only and read-write differentiation
Data confidentiality
Lower cost of key distribution
Integrity verification
2 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SECURITY ASSUMPTIONS
Semi-trusted storage servers
Tries to obtain information
Does not tamper with the data
Trusted attribute authority (TA)
Manage attributes and related keys
Users
Readers (read-only)
Writers (read-write)
Can collude to obtain more information
3 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SYSTEM OVERVIEW
4 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ATTRIBUTE-BASED ENCRYPTION
Private key associated with attributes
Access tree Tdecrypt
Defines access policies over attributes
Encrypt using access structure
Decrypt if structure is satisfied
Example
“Directors or managers or
a specifically appointed
person (trustee) can
access the data”
5 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ATTRIBUTE-BASED SIGNATURE
Users can sign resources
Signatures are based on users’ attributes
Users verify signatures
Example
“Only director-manager
users or a specifically
appointed person (trustee)
can access the data”
6 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
DATA ACCESS PROCEDURES
Create file
Encrypt phase
Sign phase
Upload phase
Read file
Verify phase
Decrypt phase
Update file
7 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
CREATE FILE
Encrypt phase
Sign phase
Upload phase
8 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ENCRYPT PHASE
The owner encrypts a file for sharing
Based on ABE
Decryption policy based on the tree Tdecrypt
CT = Enc(PKE, M, Tdecrypt)
Notation Description
CT: ciphertext
Enc: encryption algorithm
PKE: public key for encryption
M: message
Tdecrypt: access tree
9 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SIGN PHASE
The owner signs the ciphertext using ABS
Used to differentiate readers and writers
SG = Sign(PKS, SKS, h(CT)||t, Tsign)
Notation Description
SG: signature
Sign: sign algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
10 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
UPLOAD PHASE
The owner uploads CT, SG, t
The server checks signature
Accept or reject upload
R0 = Verify(PKS, h(CT)||t, Tsign, SG)
Notation Description
R0: boolean verification value
Verify: verification algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
SG: signature
11 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
READ FILE
Verify phase
Decrypt phase
12 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
VERIFY PHASE
A user obtains CT, SG, t, Tsign
Obtain public key PKS from trusted authority
Verifies if the signature is valid
R1 = Verify(PKS, h(CT)||t, Tsign, SG)
Notation Description
R1: boolean verification value
Verify: verification algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
SG: signature
13 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
DECRYPT PHASE
Decrypts ciphertext using SKU
M = Decrypt(CT, SKU)
Notation Description
M: message
Decrypt: decryption algorithm
CT: ciphertext
SKU: key corresponding to attributes U
14 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
UPDATE FILE
A user...
Updates M to M1
Encrypts message:
CT1 = Enc(PKE , M1, Tdecrypt1
)
Signs ciphertext:
SG1 = Sign(PKS, SKS, h(CT1)||t1, Tsign)
Uploads CT1, SG1, t1, Tsign
The server...
Verifies the new signature
– Check writer’s attributes
Accepts or rejects the update
15 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
WRITER-READER DIFFERENTIATION
Users differentiated by ABS
Writers can produce a valid signature
Differentiation done at attribute level
Scales better than at user level
16 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
INTEGRITY
ABS offers integrity
Hash ciphertext before signing
The integrity can be verified by...
Server
Valid users
17 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
COMPUTATIONAL OVERHEAD
Create and Update
One encryption operation
One sign operation
Cost grows with access structure matrix
Read
One decryption operation
One verify operation
Cost grows with attributes satisfied
Cost mainly generated by pairing computations
18 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SUMMARY
Secure data sharing scheme
Fine-grained access
Many-read-many-write
Integrity verification
19 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
FUTURE WORK
Use search on encrypted data
Many-read-many-write-many-search
Implementation to verify usability
20 / 21
Detailed Analysis
EXTRA SLIDES
Detailed Analysis
COMPLEXITY ANALYSIS
Create file
O(E1 × log p) + O(l × E0 × log p)
Read file
O(l ×L)+O(|U|×E1 ×log p)+O(l ×E0 ×log p)
Update file
O(E1 × log p) + O(l × E0 × log p)
Notation Description
E0 Cost of exponentiation operations in G0
E1 Cost of exponentiation operations in G1
L Cost of bilinear pairing
p Prime order of G0 and G1
U The attribute set in the access tree
l, t The matrix l × t of the monotone span program which is con-
verted from its corresponding access structure

More Related Content

What's hot (20)

Klee introduction
Klee  introductionKlee  introduction
Klee introduction
Georgiana T.
 
Symbolic Execution And KLEE
Symbolic Execution And KLEESymbolic Execution And KLEE
Symbolic Execution And KLEE
Shauvik Roy Choudhary, Ph.D.
 
Analysis of a Modified RC4
Analysis of a Modified RC4 Analysis of a Modified RC4
Analysis of a Modified RC4
Tharindu Weerasinghe
 
An effective RC4 Stream Cipher
An effective RC4 Stream CipherAn effective RC4 Stream Cipher
An effective RC4 Stream Cipher
Tharindu Weerasinghe
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
Mohammed Ashour
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
ArthyR3
 
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Andrii Vozniuk
 
Code Tuning
Code TuningCode Tuning
Code Tuning
guest4df97e3d
 
Notes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural ModellingNotes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural Modelling
Jay Baxi
 
Parallel program design
Parallel program designParallel program design
Parallel program design
ZongYing Lyu
 
EKON 12 Closures Coding
EKON 12 Closures CodingEKON 12 Closures Coding
EKON 12 Closures Coding
Max Kleiner
 
Generating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android FrameworkGenerating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android Framework
MobileSoft
 
Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33
Max Kleiner
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography Workbook
ArthyR3
 
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
A Survey on  Dynamic Symbolic Execution  for Automatic Test GenerationA Survey on  Dynamic Symbolic Execution  for Automatic Test Generation
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
Sung Kim
 
A closure ekon16
A closure ekon16A closure ekon16
A closure ekon16
Max Kleiner
 
Network Socket Programming with JAVA
Network Socket Programming with JAVANetwork Socket Programming with JAVA
Network Socket Programming with JAVA
Dudy Ali
 
Clanguage
ClanguageClanguage
Clanguage
Abhishek Khune
 
Behavioral modeling
Behavioral modelingBehavioral modeling
Behavioral modeling
dennis gookyi
 
Metrics ekon 14_2_kleiner
Metrics ekon 14_2_kleinerMetrics ekon 14_2_kleiner
Metrics ekon 14_2_kleiner
Max Kleiner
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
Mohammed Ashour
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
ArthyR3
 
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Andrii Vozniuk
 
Notes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural ModellingNotes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural Modelling
Jay Baxi
 
Parallel program design
Parallel program designParallel program design
Parallel program design
ZongYing Lyu
 
EKON 12 Closures Coding
EKON 12 Closures CodingEKON 12 Closures Coding
EKON 12 Closures Coding
Max Kleiner
 
Generating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android FrameworkGenerating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android Framework
MobileSoft
 
Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33
Max Kleiner
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography Workbook
ArthyR3
 
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
A Survey on  Dynamic Symbolic Execution  for Automatic Test GenerationA Survey on  Dynamic Symbolic Execution  for Automatic Test Generation
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
Sung Kim
 
A closure ekon16
A closure ekon16A closure ekon16
A closure ekon16
Max Kleiner
 
Network Socket Programming with JAVA
Network Socket Programming with JAVANetwork Socket Programming with JAVA
Network Socket Programming with JAVA
Dudy Ali
 
Metrics ekon 14_2_kleiner
Metrics ekon 14_2_kleinerMetrics ekon 14_2_kleiner
Metrics ekon 14_2_kleiner
Max Kleiner
 

Viewers also liked (17)

Overview of MONOMI
Overview of MONOMIOverview of MONOMI
Overview of MONOMI
Mateus S. H. Cruz
 
Helib
HelibHelib
Helib
文杰 陆
 
Soil Management, Site Selection. Soil Fertility
Soil Management, Site Selection. Soil FertilitySoil Management, Site Selection. Soil Fertility
Soil Management, Site Selection. Soil Fertility
Kerr Center for Sustainable Agriculture
 
The molecular times
The molecular timesThe molecular times
The molecular times
jonyfive5
 
The price of_children
The price of_childrenThe price of_children
The price of_children
AAR VEE
 
Lap
LapLap
Lap
Lim Wallace
 
Sat -mrphong12
Sat -mrphong12Sat -mrphong12
Sat -mrphong12
vjt_chjen
 
Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)
vjt_chjen
 
الفنادق الشبكات الاجتماعيه
الفنادق   الشبكات الاجتماعيهالفنادق   الشبكات الاجتماعيه
الفنادق الشبكات الاجتماعيه
Maryam Alhafidh
 
Fiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus OttenheijmFiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus Ottenheijm
adfiz
 
Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1
Reinoud Scheres
 
Agenda 02th may new
Agenda 02th may newAgenda 02th may new
Agenda 02th may new
bkkhealth
 
Presentacion
PresentacionPresentacion
Presentacion
Rafael Rivadeneira Campodónico
 
Using Backbone with CakePHP
Using Backbone with CakePHPUsing Backbone with CakePHP
Using Backbone with CakePHP
Richard McIntyre
 
The little ice age
The little ice ageThe little ice age
The little ice age
000175031
 
етичний кодекс лікаря україни
етичний кодекс лікаря україниетичний кодекс лікаря україни
етичний кодекс лікаря україни
Igor Nitsovych
 
The molecular times
The molecular timesThe molecular times
The molecular times
jonyfive5
 
The price of_children
The price of_childrenThe price of_children
The price of_children
AAR VEE
 
Sat -mrphong12
Sat -mrphong12Sat -mrphong12
Sat -mrphong12
vjt_chjen
 
Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)
vjt_chjen
 
الفنادق الشبكات الاجتماعيه
الفنادق   الشبكات الاجتماعيهالفنادق   الشبكات الاجتماعيه
الفنادق الشبكات الاجتماعيه
Maryam Alhafidh
 
Fiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus OttenheijmFiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus Ottenheijm
adfiz
 
Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1
Reinoud Scheres
 
Agenda 02th may new
Agenda 02th may newAgenda 02th may new
Agenda 02th may new
bkkhealth
 
Using Backbone with CakePHP
Using Backbone with CakePHPUsing Backbone with CakePHP
Using Backbone with CakePHP
Richard McIntyre
 
The little ice age
The little ice ageThe little ice age
The little ice age
000175031
 
етичний кодекс лікаря україни
етичний кодекс лікаря україниетичний кодекс лікаря україни
етичний кодекс лікаря україни
Igor Nitsovych
 

Similar to Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems (20)

WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
Chaitanya Tata, PMP
 
Shedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White PaperShedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White Paper
LINE Corporation
 
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
confluent
 
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LMESet your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
confluent
 
Findings in clus 2019
Findings in clus 2019Findings in clus 2019
Findings in clus 2019
ikuonakajima2
 
Verilog HDL Verification
Verilog HDL VerificationVerilog HDL Verification
Verilog HDL Verification
dennis gookyi
 
ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i	ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i
Protect724manoj
 
CNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to EnvoyCNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to Envoy
Harish
 
batch-4.pptx
batch-4.pptxbatch-4.pptx
batch-4.pptx
SivaReddy683163
 
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Spark Summit
 
ALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 PresentationALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 Presentation
ALOE Systems, Inc.
 
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Community
 
The Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise SecurityThe Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise Security
DevOps.com
 
Play framework : A Walkthrough
Play framework : A WalkthroughPlay framework : A Walkthrough
Play framework : A Walkthrough
mitesh_sharma
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7
Chaing Ravuth
 
High Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBandHigh Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBand
webhostingguy
 
Profile_Prateek
Profile_PrateekProfile_Prateek
Profile_Prateek
Prateek Mathur
 
 Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languages Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languages
Miguel Conde-Ferreira
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-Express
DVClub
 
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Hannes Tschofenig
 
Shedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White PaperShedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White Paper
LINE Corporation
 
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
confluent
 
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LMESet your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
confluent
 
Findings in clus 2019
Findings in clus 2019Findings in clus 2019
Findings in clus 2019
ikuonakajima2
 
Verilog HDL Verification
Verilog HDL VerificationVerilog HDL Verification
Verilog HDL Verification
dennis gookyi
 
ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i	ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i
Protect724manoj
 
CNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to EnvoyCNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to Envoy
Harish
 
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Spark Summit
 
ALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 PresentationALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 Presentation
ALOE Systems, Inc.
 
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Community
 
The Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise SecurityThe Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise Security
DevOps.com
 
Play framework : A Walkthrough
Play framework : A WalkthroughPlay framework : A Walkthrough
Play framework : A Walkthrough
mitesh_sharma
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7
Chaing Ravuth
 
High Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBandHigh Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBand
webhostingguy
 
 Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languages Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languages
Miguel Conde-Ferreira
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-Express
DVClub
 
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Hannes Tschofenig
 

Recently uploaded (15)

Presentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and MonitoringPresentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and Monitoring
mdaoudi
 
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
 
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
werhkr1
 
IoT PPT introduction to internet of things
IoT PPT introduction to internet of thingsIoT PPT introduction to internet of things
IoT PPT introduction to internet of things
VaishnaviPatil3995
 
Cloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptxCloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptx
marketing140789
 
Breaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdfBreaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdf
Internet Bundle Now
 
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdfGiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
Giacomo Vacca
 
introduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.pptintroduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.ppt
SherifElGohary7
 
AG-FIRMA Ai Agent for Agriculture | RAG ..
AG-FIRMA Ai Agent for Agriculture  | RAG ..AG-FIRMA Ai Agent for Agriculture  | RAG ..
AG-FIRMA Ai Agent for Agriculture | RAG ..
Anass Nabil
 
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
Taqyea
 
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
Taqyea
 
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
emestica1
 
ProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptxProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptx
OlenaKotovska
 
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness GuideThe Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
russellpeter1995
 
Paper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdfPaper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdf
Steven McGee
 
Presentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and MonitoringPresentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and Monitoring
mdaoudi
 
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
 
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
werhkr1
 
IoT PPT introduction to internet of things
IoT PPT introduction to internet of thingsIoT PPT introduction to internet of things
IoT PPT introduction to internet of things
VaishnaviPatil3995
 
Cloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptxCloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptx
marketing140789
 
Breaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdfBreaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdf
Internet Bundle Now
 
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdfGiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
Giacomo Vacca
 
introduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.pptintroduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.ppt
SherifElGohary7
 
AG-FIRMA Ai Agent for Agriculture | RAG ..
AG-FIRMA Ai Agent for Agriculture  | RAG ..AG-FIRMA Ai Agent for Agriculture  | RAG ..
AG-FIRMA Ai Agent for Agriculture | RAG ..
Anass Nabil
 
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
Taqyea
 
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
Taqyea
 
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
emestica1
 
ProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptxProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptx
OlenaKotovska
 
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness GuideThe Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
russellpeter1995
 
Paper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdfPaper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdf
Steven McGee
 

Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems

  • 1. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems Fangming Zhao, Takashi Nishide, and Kouichi Sakurai International Conference on Information Security Practice and Experience Ghuangzhou, China, May 2011 SWIM Seminar March 9, 2016 Mateus Cruz
  • 2. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 3. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 4. Introduction ABE/ABS Proposal Performance Analysis Conclusion BACKGROUND Outsourcing of data storage Cloud storage Privacy concerns Untrusted server Encrypt data before uploading Access controlled by keys 1 / 21
  • 5. Introduction ABE/ABS Proposal Performance Analysis Conclusion CONTRIBUTIONS Flexible and fine-grained access control read-only and read-write differentiation Data confidentiality Lower cost of key distribution Integrity verification 2 / 21
  • 6. Introduction ABE/ABS Proposal Performance Analysis Conclusion SECURITY ASSUMPTIONS Semi-trusted storage servers Tries to obtain information Does not tamper with the data Trusted attribute authority (TA) Manage attributes and related keys Users Readers (read-only) Writers (read-write) Can collude to obtain more information 3 / 21
  • 7. Introduction ABE/ABS Proposal Performance Analysis Conclusion SYSTEM OVERVIEW 4 / 21
  • 8. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 9. Introduction ABE/ABS Proposal Performance Analysis Conclusion ATTRIBUTE-BASED ENCRYPTION Private key associated with attributes Access tree Tdecrypt Defines access policies over attributes Encrypt using access structure Decrypt if structure is satisfied Example “Directors or managers or a specifically appointed person (trustee) can access the data” 5 / 21
  • 10. Introduction ABE/ABS Proposal Performance Analysis Conclusion ATTRIBUTE-BASED SIGNATURE Users can sign resources Signatures are based on users’ attributes Users verify signatures Example “Only director-manager users or a specifically appointed person (trustee) can access the data” 6 / 21
  • 11. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 12. Introduction ABE/ABS Proposal Performance Analysis Conclusion DATA ACCESS PROCEDURES Create file Encrypt phase Sign phase Upload phase Read file Verify phase Decrypt phase Update file 7 / 21
  • 13. Introduction ABE/ABS Proposal Performance Analysis Conclusion CREATE FILE Encrypt phase Sign phase Upload phase 8 / 21
  • 14. Introduction ABE/ABS Proposal Performance Analysis Conclusion ENCRYPT PHASE The owner encrypts a file for sharing Based on ABE Decryption policy based on the tree Tdecrypt CT = Enc(PKE, M, Tdecrypt) Notation Description CT: ciphertext Enc: encryption algorithm PKE: public key for encryption M: message Tdecrypt: access tree 9 / 21
  • 15. Introduction ABE/ABS Proposal Performance Analysis Conclusion SIGN PHASE The owner signs the ciphertext using ABS Used to differentiate readers and writers SG = Sign(PKS, SKS, h(CT)||t, Tsign) Notation Description SG: signature Sign: sign algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree 10 / 21
  • 16. Introduction ABE/ABS Proposal Performance Analysis Conclusion UPLOAD PHASE The owner uploads CT, SG, t The server checks signature Accept or reject upload R0 = Verify(PKS, h(CT)||t, Tsign, SG) Notation Description R0: boolean verification value Verify: verification algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree SG: signature 11 / 21
  • 17. Introduction ABE/ABS Proposal Performance Analysis Conclusion READ FILE Verify phase Decrypt phase 12 / 21
  • 18. Introduction ABE/ABS Proposal Performance Analysis Conclusion VERIFY PHASE A user obtains CT, SG, t, Tsign Obtain public key PKS from trusted authority Verifies if the signature is valid R1 = Verify(PKS, h(CT)||t, Tsign, SG) Notation Description R1: boolean verification value Verify: verification algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree SG: signature 13 / 21
  • 19. Introduction ABE/ABS Proposal Performance Analysis Conclusion DECRYPT PHASE Decrypts ciphertext using SKU M = Decrypt(CT, SKU) Notation Description M: message Decrypt: decryption algorithm CT: ciphertext SKU: key corresponding to attributes U 14 / 21
  • 20. Introduction ABE/ABS Proposal Performance Analysis Conclusion UPDATE FILE A user... Updates M to M1 Encrypts message: CT1 = Enc(PKE , M1, Tdecrypt1 ) Signs ciphertext: SG1 = Sign(PKS, SKS, h(CT1)||t1, Tsign) Uploads CT1, SG1, t1, Tsign The server... Verifies the new signature – Check writer’s attributes Accepts or rejects the update 15 / 21
  • 21. Introduction ABE/ABS Proposal Performance Analysis Conclusion WRITER-READER DIFFERENTIATION Users differentiated by ABS Writers can produce a valid signature Differentiation done at attribute level Scales better than at user level 16 / 21
  • 22. Introduction ABE/ABS Proposal Performance Analysis Conclusion INTEGRITY ABS offers integrity Hash ciphertext before signing The integrity can be verified by... Server Valid users 17 / 21
  • 23. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 24. Introduction ABE/ABS Proposal Performance Analysis Conclusion COMPUTATIONAL OVERHEAD Create and Update One encryption operation One sign operation Cost grows with access structure matrix Read One decryption operation One verify operation Cost grows with attributes satisfied Cost mainly generated by pairing computations 18 / 21
  • 25. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 26. Introduction ABE/ABS Proposal Performance Analysis Conclusion SUMMARY Secure data sharing scheme Fine-grained access Many-read-many-write Integrity verification 19 / 21
  • 27. Introduction ABE/ABS Proposal Performance Analysis Conclusion FUTURE WORK Use search on encrypted data Many-read-many-write-many-search Implementation to verify usability 20 / 21
  • 29. Detailed Analysis COMPLEXITY ANALYSIS Create file O(E1 × log p) + O(l × E0 × log p) Read file O(l ×L)+O(|U|×E1 ×log p)+O(l ×E0 ×log p) Update file O(E1 × log p) + O(l × E0 × log p) Notation Description E0 Cost of exponentiation operations in G0 E1 Cost of exponentiation operations in G1 L Cost of bilinear pairing p Prime order of G0 and G1 U The attribute set in the access tree l, t The matrix l × t of the monotone span program which is con- verted from its corresponding access structure
  翻译: