SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Realizing Fine-Grained and
Flexible Access Control to
Outsourced Data with
Attribute-Based Cryptosystems
Fangming Zhao, Takashi Nishide, and Kouichi Sakurai
International Conference on Information Security Practice and Experience
Ghuangzhou, China, May 2011
SWIM Seminar
March 9, 2016
Mateus Cruz
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
BACKGROUND
Outsourcing of data storage
Cloud storage
Privacy concerns
Untrusted server
Encrypt data before uploading
Access controlled by keys
1 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
CONTRIBUTIONS
Flexible and fine-grained access control
read-only and read-write differentiation
Data confidentiality
Lower cost of key distribution
Integrity verification
2 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SECURITY ASSUMPTIONS
Semi-trusted storage servers
Tries to obtain information
Does not tamper with the data
Trusted attribute authority (TA)
Manage attributes and related keys
Users
Readers (read-only)
Writers (read-write)
Can collude to obtain more information
3 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SYSTEM OVERVIEW
4 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ATTRIBUTE-BASED ENCRYPTION
Private key associated with attributes
Access tree Tdecrypt
Defines access policies over attributes
Encrypt using access structure
Decrypt if structure is satisfied
Example
“Directors or managers or
a specifically appointed
person (trustee) can
access the data”
5 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ATTRIBUTE-BASED SIGNATURE
Users can sign resources
Signatures are based on users’ attributes
Users verify signatures
Example
“Only director-manager
users or a specifically
appointed person (trustee)
can access the data”
6 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
DATA ACCESS PROCEDURES
Create file
Encrypt phase
Sign phase
Upload phase
Read file
Verify phase
Decrypt phase
Update file
7 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
CREATE FILE
Encrypt phase
Sign phase
Upload phase
8 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ENCRYPT PHASE
The owner encrypts a file for sharing
Based on ABE
Decryption policy based on the tree Tdecrypt
CT = Enc(PKE, M, Tdecrypt)
Notation Description
CT: ciphertext
Enc: encryption algorithm
PKE: public key for encryption
M: message
Tdecrypt: access tree
9 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SIGN PHASE
The owner signs the ciphertext using ABS
Used to differentiate readers and writers
SG = Sign(PKS, SKS, h(CT)||t, Tsign)
Notation Description
SG: signature
Sign: sign algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
10 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
UPLOAD PHASE
The owner uploads CT, SG, t
The server checks signature
Accept or reject upload
R0 = Verify(PKS, h(CT)||t, Tsign, SG)
Notation Description
R0: boolean verification value
Verify: verification algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
SG: signature
11 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
READ FILE
Verify phase
Decrypt phase
12 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
VERIFY PHASE
A user obtains CT, SG, t, Tsign
Obtain public key PKS from trusted authority
Verifies if the signature is valid
R1 = Verify(PKS, h(CT)||t, Tsign, SG)
Notation Description
R1: boolean verification value
Verify: verification algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
SG: signature
13 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
DECRYPT PHASE
Decrypts ciphertext using SKU
M = Decrypt(CT, SKU)
Notation Description
M: message
Decrypt: decryption algorithm
CT: ciphertext
SKU: key corresponding to attributes U
14 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
UPDATE FILE
A user...
Updates M to M1
Encrypts message:
CT1 = Enc(PKE , M1, Tdecrypt1
)
Signs ciphertext:
SG1 = Sign(PKS, SKS, h(CT1)||t1, Tsign)
Uploads CT1, SG1, t1, Tsign
The server...
Verifies the new signature
– Check writer’s attributes
Accepts or rejects the update
15 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
WRITER-READER DIFFERENTIATION
Users differentiated by ABS
Writers can produce a valid signature
Differentiation done at attribute level
Scales better than at user level
16 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
INTEGRITY
ABS offers integrity
Hash ciphertext before signing
The integrity can be verified by...
Server
Valid users
17 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
COMPUTATIONAL OVERHEAD
Create and Update
One encryption operation
One sign operation
Cost grows with access structure matrix
Read
One decryption operation
One verify operation
Cost grows with attributes satisfied
Cost mainly generated by pairing computations
18 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SUMMARY
Secure data sharing scheme
Fine-grained access
Many-read-many-write
Integrity verification
19 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
FUTURE WORK
Use search on encrypted data
Many-read-many-write-many-search
Implementation to verify usability
20 / 21
Detailed Analysis
EXTRA SLIDES
Detailed Analysis
COMPLEXITY ANALYSIS
Create file
O(E1 × log p) + O(l × E0 × log p)
Read file
O(l ×L)+O(|U|×E1 ×log p)+O(l ×E0 ×log p)
Update file
O(E1 × log p) + O(l × E0 × log p)
Notation Description
E0 Cost of exponentiation operations in G0
E1 Cost of exponentiation operations in G1
L Cost of bilinear pairing
p Prime order of G0 and G1
U The attribute set in the access tree
l, t The matrix l × t of the monotone span program which is con-
verted from its corresponding access structure

Weitere ähnliche Inhalte

Was ist angesagt?

Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationMohammed Ashour
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)ArthyR3
 
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk Andrii Vozniuk
 
Notes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural ModellingNotes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural ModellingJay Baxi
 
Parallel program design
Parallel program designParallel program design
Parallel program designZongYing Lyu
 
EKON 12 Closures Coding
EKON 12 Closures CodingEKON 12 Closures Coding
EKON 12 Closures CodingMax Kleiner
 
Generating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android FrameworkGenerating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android FrameworkMobileSoft
 
Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33Max Kleiner
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography WorkbookArthyR3
 
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
A Survey on  Dynamic Symbolic Execution  for Automatic Test GenerationA Survey on  Dynamic Symbolic Execution  for Automatic Test Generation
A Survey on Dynamic Symbolic Execution for Automatic Test GenerationSung Kim
 
A closure ekon16
A closure ekon16A closure ekon16
A closure ekon16Max Kleiner
 
Network Socket Programming with JAVA
Network Socket Programming with JAVANetwork Socket Programming with JAVA
Network Socket Programming with JAVADudy Ali
 
Metrics ekon 14_2_kleiner
Metrics ekon 14_2_kleinerMetrics ekon 14_2_kleiner
Metrics ekon 14_2_kleinerMax Kleiner
 

Was ist angesagt? (20)

Klee introduction
Klee  introductionKlee  introduction
Klee introduction
 
Symbolic Execution And KLEE
Symbolic Execution And KLEESymbolic Execution And KLEE
Symbolic Execution And KLEE
 
Analysis of a Modified RC4
Analysis of a Modified RC4 Analysis of a Modified RC4
Analysis of a Modified RC4
 
An effective RC4 Stream Cipher
An effective RC4 Stream CipherAn effective RC4 Stream Cipher
An effective RC4 Stream Cipher
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
 
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
 
Code Tuning
Code TuningCode Tuning
Code Tuning
 
Notes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural ModellingNotes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural Modelling
 
Parallel program design
Parallel program designParallel program design
Parallel program design
 
EKON 12 Closures Coding
EKON 12 Closures CodingEKON 12 Closures Coding
EKON 12 Closures Coding
 
Generating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android FrameworkGenerating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android Framework
 
Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography Workbook
 
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
A Survey on  Dynamic Symbolic Execution  for Automatic Test GenerationA Survey on  Dynamic Symbolic Execution  for Automatic Test Generation
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
 
A closure ekon16
A closure ekon16A closure ekon16
A closure ekon16
 
Network Socket Programming with JAVA
Network Socket Programming with JAVANetwork Socket Programming with JAVA
Network Socket Programming with JAVA
 
Clanguage
ClanguageClanguage
Clanguage
 
Behavioral modeling
Behavioral modelingBehavioral modeling
Behavioral modeling
 
Metrics ekon 14_2_kleiner
Metrics ekon 14_2_kleinerMetrics ekon 14_2_kleiner
Metrics ekon 14_2_kleiner
 

Andere mochten auch

The molecular times
The molecular timesThe molecular times
The molecular timesjonyfive5
 
The price of_children
The price of_childrenThe price of_children
The price of_childrenAAR VEE
 
Sat -mrphong12
Sat -mrphong12Sat -mrphong12
Sat -mrphong12vjt_chjen
 
Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)vjt_chjen
 
الفنادق الشبكات الاجتماعيه
الفنادق   الشبكات الاجتماعيهالفنادق   الشبكات الاجتماعيه
الفنادق الشبكات الاجتماعيهMaryam Alhafidh
 
Fiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus OttenheijmFiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus Ottenheijmadfiz
 
Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1Reinoud Scheres
 
Agenda 02th may new
Agenda 02th may newAgenda 02th may new
Agenda 02th may newbkkhealth
 
Using Backbone with CakePHP
Using Backbone with CakePHPUsing Backbone with CakePHP
Using Backbone with CakePHPRichard McIntyre
 
The little ice age
The little ice ageThe little ice age
The little ice age000175031
 
етичний кодекс лікаря україни
етичний кодекс лікаря україниетичний кодекс лікаря україни
етичний кодекс лікаря україниIgor Nitsovych
 

Andere mochten auch (17)

Overview of MONOMI
Overview of MONOMIOverview of MONOMI
Overview of MONOMI
 
Helib
HelibHelib
Helib
 
Soil Management, Site Selection. Soil Fertility
Soil Management, Site Selection. Soil FertilitySoil Management, Site Selection. Soil Fertility
Soil Management, Site Selection. Soil Fertility
 
The molecular times
The molecular timesThe molecular times
The molecular times
 
The price of_children
The price of_childrenThe price of_children
The price of_children
 
Lap
LapLap
Lap
 
Sat -mrphong12
Sat -mrphong12Sat -mrphong12
Sat -mrphong12
 
Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)
 
الفنادق الشبكات الاجتماعيه
الفنادق   الشبكات الاجتماعيهالفنادق   الشبكات الاجتماعيه
الفنادق الشبكات الاجتماعيه
 
Fiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus OttenheijmFiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus Ottenheijm
 
Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1
 
Agenda 02th may new
Agenda 02th may newAgenda 02th may new
Agenda 02th may new
 
Presentacion
PresentacionPresentacion
Presentacion
 
Using Backbone with CakePHP
Using Backbone with CakePHPUsing Backbone with CakePHP
Using Backbone with CakePHP
 
The little ice age
The little ice ageThe little ice age
The little ice age
 
Programa eco
Programa ecoPrograma eco
Programa eco
 
етичний кодекс лікаря україни
етичний кодекс лікаря україниетичний кодекс лікаря україни
етичний кодекс лікаря україни
 

Ähnlich wie Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems

Shedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White PaperShedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White PaperLINE Corporation
 
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020confluent
 
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LMESet your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LMEconfluent
 
Findings in clus 2019
Findings in clus 2019Findings in clus 2019
Findings in clus 2019ikuonakajima2
 
Verilog HDL Verification
Verilog HDL VerificationVerilog HDL Verification
Verilog HDL Verificationdennis gookyi
 
ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i	ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i Protect724manoj
 
CNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to EnvoyCNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to EnvoyHarish
 
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)Spark Summit
 
ALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 PresentationALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 PresentationALOE Systems, Inc.
 
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph Ceph Community
 
The Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise SecurityThe Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise SecurityDevOps.com
 
Play framework : A Walkthrough
Play framework : A WalkthroughPlay framework : A Walkthrough
Play framework : A Walkthroughmitesh_sharma
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7Chaing Ravuth
 
High Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBandHigh Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBandwebhostingguy
 
 Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languages Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languagesMiguel Conde-Ferreira
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-ExpressDVClub
 
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesHannes Tschofenig
 

Ähnlich wie Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems (20)

WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Shedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White PaperShedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White Paper
 
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
 
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LMESet your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
 
Findings in clus 2019
Findings in clus 2019Findings in clus 2019
Findings in clus 2019
 
Verilog HDL Verification
Verilog HDL VerificationVerilog HDL Verification
Verilog HDL Verification
 
ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i	ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i
 
CNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to EnvoyCNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to Envoy
 
batch-4.pptx
batch-4.pptxbatch-4.pptx
batch-4.pptx
 
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
 
ALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 PresentationALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 Presentation
 
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
 
The Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise SecurityThe Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise Security
 
Play framework : A Walkthrough
Play framework : A WalkthroughPlay framework : A Walkthrough
Play framework : A Walkthrough
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7
 
High Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBandHigh Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBand
 
Profile_Prateek
Profile_PrateekProfile_Prateek
Profile_Prateek
 
 Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languages Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languages
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-Express
 
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
 

Kürzlich hochgeladen

Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...nirzagarg
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 

Kürzlich hochgeladen (20)

Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 

Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems

  • 1. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems Fangming Zhao, Takashi Nishide, and Kouichi Sakurai International Conference on Information Security Practice and Experience Ghuangzhou, China, May 2011 SWIM Seminar March 9, 2016 Mateus Cruz
  • 2. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 3. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 4. Introduction ABE/ABS Proposal Performance Analysis Conclusion BACKGROUND Outsourcing of data storage Cloud storage Privacy concerns Untrusted server Encrypt data before uploading Access controlled by keys 1 / 21
  • 5. Introduction ABE/ABS Proposal Performance Analysis Conclusion CONTRIBUTIONS Flexible and fine-grained access control read-only and read-write differentiation Data confidentiality Lower cost of key distribution Integrity verification 2 / 21
  • 6. Introduction ABE/ABS Proposal Performance Analysis Conclusion SECURITY ASSUMPTIONS Semi-trusted storage servers Tries to obtain information Does not tamper with the data Trusted attribute authority (TA) Manage attributes and related keys Users Readers (read-only) Writers (read-write) Can collude to obtain more information 3 / 21
  • 7. Introduction ABE/ABS Proposal Performance Analysis Conclusion SYSTEM OVERVIEW 4 / 21
  • 8. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 9. Introduction ABE/ABS Proposal Performance Analysis Conclusion ATTRIBUTE-BASED ENCRYPTION Private key associated with attributes Access tree Tdecrypt Defines access policies over attributes Encrypt using access structure Decrypt if structure is satisfied Example “Directors or managers or a specifically appointed person (trustee) can access the data” 5 / 21
  • 10. Introduction ABE/ABS Proposal Performance Analysis Conclusion ATTRIBUTE-BASED SIGNATURE Users can sign resources Signatures are based on users’ attributes Users verify signatures Example “Only director-manager users or a specifically appointed person (trustee) can access the data” 6 / 21
  • 11. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 12. Introduction ABE/ABS Proposal Performance Analysis Conclusion DATA ACCESS PROCEDURES Create file Encrypt phase Sign phase Upload phase Read file Verify phase Decrypt phase Update file 7 / 21
  • 13. Introduction ABE/ABS Proposal Performance Analysis Conclusion CREATE FILE Encrypt phase Sign phase Upload phase 8 / 21
  • 14. Introduction ABE/ABS Proposal Performance Analysis Conclusion ENCRYPT PHASE The owner encrypts a file for sharing Based on ABE Decryption policy based on the tree Tdecrypt CT = Enc(PKE, M, Tdecrypt) Notation Description CT: ciphertext Enc: encryption algorithm PKE: public key for encryption M: message Tdecrypt: access tree 9 / 21
  • 15. Introduction ABE/ABS Proposal Performance Analysis Conclusion SIGN PHASE The owner signs the ciphertext using ABS Used to differentiate readers and writers SG = Sign(PKS, SKS, h(CT)||t, Tsign) Notation Description SG: signature Sign: sign algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree 10 / 21
  • 16. Introduction ABE/ABS Proposal Performance Analysis Conclusion UPLOAD PHASE The owner uploads CT, SG, t The server checks signature Accept or reject upload R0 = Verify(PKS, h(CT)||t, Tsign, SG) Notation Description R0: boolean verification value Verify: verification algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree SG: signature 11 / 21
  • 17. Introduction ABE/ABS Proposal Performance Analysis Conclusion READ FILE Verify phase Decrypt phase 12 / 21
  • 18. Introduction ABE/ABS Proposal Performance Analysis Conclusion VERIFY PHASE A user obtains CT, SG, t, Tsign Obtain public key PKS from trusted authority Verifies if the signature is valid R1 = Verify(PKS, h(CT)||t, Tsign, SG) Notation Description R1: boolean verification value Verify: verification algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree SG: signature 13 / 21
  • 19. Introduction ABE/ABS Proposal Performance Analysis Conclusion DECRYPT PHASE Decrypts ciphertext using SKU M = Decrypt(CT, SKU) Notation Description M: message Decrypt: decryption algorithm CT: ciphertext SKU: key corresponding to attributes U 14 / 21
  • 20. Introduction ABE/ABS Proposal Performance Analysis Conclusion UPDATE FILE A user... Updates M to M1 Encrypts message: CT1 = Enc(PKE , M1, Tdecrypt1 ) Signs ciphertext: SG1 = Sign(PKS, SKS, h(CT1)||t1, Tsign) Uploads CT1, SG1, t1, Tsign The server... Verifies the new signature – Check writer’s attributes Accepts or rejects the update 15 / 21
  • 21. Introduction ABE/ABS Proposal Performance Analysis Conclusion WRITER-READER DIFFERENTIATION Users differentiated by ABS Writers can produce a valid signature Differentiation done at attribute level Scales better than at user level 16 / 21
  • 22. Introduction ABE/ABS Proposal Performance Analysis Conclusion INTEGRITY ABS offers integrity Hash ciphertext before signing The integrity can be verified by... Server Valid users 17 / 21
  • 23. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 24. Introduction ABE/ABS Proposal Performance Analysis Conclusion COMPUTATIONAL OVERHEAD Create and Update One encryption operation One sign operation Cost grows with access structure matrix Read One decryption operation One verify operation Cost grows with attributes satisfied Cost mainly generated by pairing computations 18 / 21
  • 25. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 26. Introduction ABE/ABS Proposal Performance Analysis Conclusion SUMMARY Secure data sharing scheme Fine-grained access Many-read-many-write Integrity verification 19 / 21
  • 27. Introduction ABE/ABS Proposal Performance Analysis Conclusion FUTURE WORK Use search on encrypted data Many-read-many-write-many-search Implementation to verify usability 20 / 21
  • 29. Detailed Analysis COMPLEXITY ANALYSIS Create file O(E1 × log p) + O(l × E0 × log p) Read file O(l ×L)+O(|U|×E1 ×log p)+O(l ×E0 ×log p) Update file O(E1 × log p) + O(l × E0 × log p) Notation Description E0 Cost of exponentiation operations in G0 E1 Cost of exponentiation operations in G1 L Cost of bilinear pairing p Prime order of G0 and G1 U The attribute set in the access tree l, t The matrix l × t of the monotone span program which is con- verted from its corresponding access structure