SlideShare a Scribd company logo
1 of 29
Download to read offline
Realizing Fine-Grained and
Flexible Access Control to
Outsourced Data with
Attribute-Based Cryptosystems
Fangming Zhao, Takashi Nishide, and Kouichi Sakurai
International Conference on Information Security Practice and Experience
Ghuangzhou, China, May 2011
SWIM Seminar
March 9, 2016
Mateus Cruz
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
BACKGROUND
Outsourcing of data storage
Cloud storage
Privacy concerns
Untrusted server
Encrypt data before uploading
Access controlled by keys
1 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
CONTRIBUTIONS
Flexible and fine-grained access control
read-only and read-write differentiation
Data confidentiality
Lower cost of key distribution
Integrity verification
2 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SECURITY ASSUMPTIONS
Semi-trusted storage servers
Tries to obtain information
Does not tamper with the data
Trusted attribute authority (TA)
Manage attributes and related keys
Users
Readers (read-only)
Writers (read-write)
Can collude to obtain more information
3 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SYSTEM OVERVIEW
4 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ATTRIBUTE-BASED ENCRYPTION
Private key associated with attributes
Access tree Tdecrypt
Defines access policies over attributes
Encrypt using access structure
Decrypt if structure is satisfied
Example
“Directors or managers or
a specifically appointed
person (trustee) can
access the data”
5 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ATTRIBUTE-BASED SIGNATURE
Users can sign resources
Signatures are based on users’ attributes
Users verify signatures
Example
“Only director-manager
users or a specifically
appointed person (trustee)
can access the data”
6 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
DATA ACCESS PROCEDURES
Create file
Encrypt phase
Sign phase
Upload phase
Read file
Verify phase
Decrypt phase
Update file
7 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
CREATE FILE
Encrypt phase
Sign phase
Upload phase
8 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
ENCRYPT PHASE
The owner encrypts a file for sharing
Based on ABE
Decryption policy based on the tree Tdecrypt
CT = Enc(PKE, M, Tdecrypt)
Notation Description
CT: ciphertext
Enc: encryption algorithm
PKE: public key for encryption
M: message
Tdecrypt: access tree
9 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SIGN PHASE
The owner signs the ciphertext using ABS
Used to differentiate readers and writers
SG = Sign(PKS, SKS, h(CT)||t, Tsign)
Notation Description
SG: signature
Sign: sign algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
10 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
UPLOAD PHASE
The owner uploads CT, SG, t
The server checks signature
Accept or reject upload
R0 = Verify(PKS, h(CT)||t, Tsign, SG)
Notation Description
R0: boolean verification value
Verify: verification algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
SG: signature
11 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
READ FILE
Verify phase
Decrypt phase
12 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
VERIFY PHASE
A user obtains CT, SG, t, Tsign
Obtain public key PKS from trusted authority
Verifies if the signature is valid
R1 = Verify(PKS, h(CT)||t, Tsign, SG)
Notation Description
R1: boolean verification value
Verify: verification algorithm
PKS: public key for signing
h: hash function
CT: ciphertext
t: timestamp
Tsign: access tree
SG: signature
13 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
DECRYPT PHASE
Decrypts ciphertext using SKU
M = Decrypt(CT, SKU)
Notation Description
M: message
Decrypt: decryption algorithm
CT: ciphertext
SKU: key corresponding to attributes U
14 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
UPDATE FILE
A user...
Updates M to M1
Encrypts message:
CT1 = Enc(PKE , M1, Tdecrypt1
)
Signs ciphertext:
SG1 = Sign(PKS, SKS, h(CT1)||t1, Tsign)
Uploads CT1, SG1, t1, Tsign
The server...
Verifies the new signature
– Check writer’s attributes
Accepts or rejects the update
15 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
WRITER-READER DIFFERENTIATION
Users differentiated by ABS
Writers can produce a valid signature
Differentiation done at attribute level
Scales better than at user level
16 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
INTEGRITY
ABS offers integrity
Hash ciphertext before signing
The integrity can be verified by...
Server
Valid users
17 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
COMPUTATIONAL OVERHEAD
Create and Update
One encryption operation
One sign operation
Cost grows with access structure matrix
Read
One decryption operation
One verify operation
Cost grows with attributes satisfied
Cost mainly generated by pairing computations
18 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
OUTLINE
1 Introduction
2 ABE/ABS
3 Proposal
4 Performance Analysis
5 Conclusion
Introduction ABE/ABS Proposal Performance Analysis Conclusion
SUMMARY
Secure data sharing scheme
Fine-grained access
Many-read-many-write
Integrity verification
19 / 21
Introduction ABE/ABS Proposal Performance Analysis Conclusion
FUTURE WORK
Use search on encrypted data
Many-read-many-write-many-search
Implementation to verify usability
20 / 21
Detailed Analysis
EXTRA SLIDES
Detailed Analysis
COMPLEXITY ANALYSIS
Create file
O(E1 × log p) + O(l × E0 × log p)
Read file
O(l ×L)+O(|U|×E1 ×log p)+O(l ×E0 ×log p)
Update file
O(E1 × log p) + O(l × E0 × log p)
Notation Description
E0 Cost of exponentiation operations in G0
E1 Cost of exponentiation operations in G1
L Cost of bilinear pairing
p Prime order of G0 and G1
U The attribute set in the access tree
l, t The matrix l × t of the monotone span program which is con-
verted from its corresponding access structure

More Related Content

What's hot

Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationMohammed Ashour
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)ArthyR3
 
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk Andrii Vozniuk
 
Notes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural ModellingNotes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural ModellingJay Baxi
 
Parallel program design
Parallel program designParallel program design
Parallel program designZongYing Lyu
 
EKON 12 Closures Coding
EKON 12 Closures CodingEKON 12 Closures Coding
EKON 12 Closures CodingMax Kleiner
 
Generating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android FrameworkGenerating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android FrameworkMobileSoft
 
Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33Max Kleiner
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography WorkbookArthyR3
 
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
A Survey on  Dynamic Symbolic Execution  for Automatic Test GenerationA Survey on  Dynamic Symbolic Execution  for Automatic Test Generation
A Survey on Dynamic Symbolic Execution for Automatic Test GenerationSung Kim
 
A closure ekon16
A closure ekon16A closure ekon16
A closure ekon16Max Kleiner
 
Network Socket Programming with JAVA
Network Socket Programming with JAVANetwork Socket Programming with JAVA
Network Socket Programming with JAVADudy Ali
 
Metrics ekon 14_2_kleiner
Metrics ekon 14_2_kleinerMetrics ekon 14_2_kleiner
Metrics ekon 14_2_kleinerMax Kleiner
 

What's hot (20)

Klee introduction
Klee  introductionKlee  introduction
Klee introduction
 
Symbolic Execution And KLEE
Symbolic Execution And KLEESymbolic Execution And KLEE
Symbolic Execution And KLEE
 
Analysis of a Modified RC4
Analysis of a Modified RC4 Analysis of a Modified RC4
Analysis of a Modified RC4
 
An effective RC4 Stream Cipher
An effective RC4 Stream CipherAn effective RC4 Stream Cipher
An effective RC4 Stream Cipher
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
 
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
Symbolic Reasoning and Concrete Execution - Andrii Vozniuk
 
Code Tuning
Code TuningCode Tuning
Code Tuning
 
Notes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural ModellingNotes: Verilog Part 4- Behavioural Modelling
Notes: Verilog Part 4- Behavioural Modelling
 
Parallel program design
Parallel program designParallel program design
Parallel program design
 
EKON 12 Closures Coding
EKON 12 Closures CodingEKON 12 Closures Coding
EKON 12 Closures Coding
 
Generating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android FrameworkGenerating Predicate Callback Summaries for the Android Framework
Generating Predicate Callback Summaries for the Android Framework
 
Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33Use of an Oscilloscope - maXbox Starter33
Use of an Oscilloscope - maXbox Starter33
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography Workbook
 
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
A Survey on  Dynamic Symbolic Execution  for Automatic Test GenerationA Survey on  Dynamic Symbolic Execution  for Automatic Test Generation
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
 
A closure ekon16
A closure ekon16A closure ekon16
A closure ekon16
 
Network Socket Programming with JAVA
Network Socket Programming with JAVANetwork Socket Programming with JAVA
Network Socket Programming with JAVA
 
Clanguage
ClanguageClanguage
Clanguage
 
Behavioral modeling
Behavioral modelingBehavioral modeling
Behavioral modeling
 
Metrics ekon 14_2_kleiner
Metrics ekon 14_2_kleinerMetrics ekon 14_2_kleiner
Metrics ekon 14_2_kleiner
 

Viewers also liked

The molecular times
The molecular timesThe molecular times
The molecular timesjonyfive5
 
The price of_children
The price of_childrenThe price of_children
The price of_childrenAAR VEE
 
Sat -mrphong12
Sat -mrphong12Sat -mrphong12
Sat -mrphong12vjt_chjen
 
Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)vjt_chjen
 
الفنادق الشبكات الاجتماعيه
الفنادق   الشبكات الاجتماعيهالفنادق   الشبكات الاجتماعيه
الفنادق الشبكات الاجتماعيهMaryam Alhafidh
 
Fiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus OttenheijmFiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus Ottenheijmadfiz
 
Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1Reinoud Scheres
 
Agenda 02th may new
Agenda 02th may newAgenda 02th may new
Agenda 02th may newbkkhealth
 
Using Backbone with CakePHP
Using Backbone with CakePHPUsing Backbone with CakePHP
Using Backbone with CakePHPRichard McIntyre
 
The little ice age
The little ice ageThe little ice age
The little ice age000175031
 
етичний кодекс лікаря україни
етичний кодекс лікаря україниетичний кодекс лікаря україни
етичний кодекс лікаря україниIgor Nitsovych
 

Viewers also liked (17)

Overview of MONOMI
Overview of MONOMIOverview of MONOMI
Overview of MONOMI
 
Helib
HelibHelib
Helib
 
Soil Management, Site Selection. Soil Fertility
Soil Management, Site Selection. Soil FertilitySoil Management, Site Selection. Soil Fertility
Soil Management, Site Selection. Soil Fertility
 
The molecular times
The molecular timesThe molecular times
The molecular times
 
The price of_children
The price of_childrenThe price of_children
The price of_children
 
Lap
LapLap
Lap
 
Sat -mrphong12
Sat -mrphong12Sat -mrphong12
Sat -mrphong12
 
Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)Cau chuyen hoa hoc (phan 2)
Cau chuyen hoa hoc (phan 2)
 
الفنادق الشبكات الاجتماعيه
الفنادق   الشبكات الاجتماعيهالفنادق   الشبكات الاجتماعيه
الفنادق الشبكات الاجتماعيه
 
Fiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus OttenheijmFiscale aspecten - Guus Ottenheijm
Fiscale aspecten - Guus Ottenheijm
 
Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1Externe veiligheid en het ruimtelijk planproces (3) 1
Externe veiligheid en het ruimtelijk planproces (3) 1
 
Agenda 02th may new
Agenda 02th may newAgenda 02th may new
Agenda 02th may new
 
Presentacion
PresentacionPresentacion
Presentacion
 
Using Backbone with CakePHP
Using Backbone with CakePHPUsing Backbone with CakePHP
Using Backbone with CakePHP
 
The little ice age
The little ice ageThe little ice age
The little ice age
 
Programa eco
Programa ecoPrograma eco
Programa eco
 
етичний кодекс лікаря україни
етичний кодекс лікаря україниетичний кодекс лікаря україни
етичний кодекс лікаря україни
 

Similar to Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems

Shedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White PaperShedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White PaperLINE Corporation
 
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020confluent
 
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LMESet your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LMEconfluent
 
Findings in clus 2019
Findings in clus 2019Findings in clus 2019
Findings in clus 2019ikuonakajima2
 
Verilog HDL Verification
Verilog HDL VerificationVerilog HDL Verification
Verilog HDL Verificationdennis gookyi
 
ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i	ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i Protect724manoj
 
CNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to EnvoyCNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to EnvoyHarish
 
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)Spark Summit
 
ALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 PresentationALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 PresentationALOE Systems, Inc.
 
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph Ceph Community
 
The Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise SecurityThe Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise SecurityDevOps.com
 
Play framework : A Walkthrough
Play framework : A WalkthroughPlay framework : A Walkthrough
Play framework : A Walkthroughmitesh_sharma
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7Chaing Ravuth
 
High Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBandHigh Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBandwebhostingguy
 
 Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languages Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languagesMiguel Conde-Ferreira
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-ExpressDVClub
 
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesHannes Tschofenig
 

Similar to Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems (20)

WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Shedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White PaperShedding Light on LINE Token Economy You Won't Find in Our White Paper
Shedding Light on LINE Token Economy You Won't Find in Our White Paper
 
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
Securing Kafka At Zendesk (Joy Nag, Zendesk) Kafka Summit 2020
 
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LMESet your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
 
Findings in clus 2019
Findings in clus 2019Findings in clus 2019
Findings in clus 2019
 
Verilog HDL Verification
Verilog HDL VerificationVerilog HDL Verification
Verilog HDL Verification
 
ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i	ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i
 
CNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to EnvoyCNCF Singapore - Introduction to Envoy
CNCF Singapore - Introduction to Envoy
 
batch-4.pptx
batch-4.pptxbatch-4.pptx
batch-4.pptx
 
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
 
ALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 PresentationALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 Presentation
 
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
Ceph Day Seoul - AFCeph: SKT Scale Out Storage Ceph
 
The Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise SecurityThe Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise Security
 
Play framework : A Walkthrough
Play framework : A WalkthroughPlay framework : A Walkthrough
Play framework : A Walkthrough
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7
 
High Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBandHigh Performance Communication for Oracle using InfiniBand
High Performance Communication for Oracle using InfiniBand
 
Profile_Prateek
Profile_PrateekProfile_Prateek
Profile_Prateek
 
 Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languages Test system architectures using advanced standardized test languages
 Test system architectures using advanced standardized test languages
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-Express
 
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
 

Recently uploaded

Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 

Recently uploaded (20)

Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 

Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems

  • 1. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems Fangming Zhao, Takashi Nishide, and Kouichi Sakurai International Conference on Information Security Practice and Experience Ghuangzhou, China, May 2011 SWIM Seminar March 9, 2016 Mateus Cruz
  • 2. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 3. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 4. Introduction ABE/ABS Proposal Performance Analysis Conclusion BACKGROUND Outsourcing of data storage Cloud storage Privacy concerns Untrusted server Encrypt data before uploading Access controlled by keys 1 / 21
  • 5. Introduction ABE/ABS Proposal Performance Analysis Conclusion CONTRIBUTIONS Flexible and fine-grained access control read-only and read-write differentiation Data confidentiality Lower cost of key distribution Integrity verification 2 / 21
  • 6. Introduction ABE/ABS Proposal Performance Analysis Conclusion SECURITY ASSUMPTIONS Semi-trusted storage servers Tries to obtain information Does not tamper with the data Trusted attribute authority (TA) Manage attributes and related keys Users Readers (read-only) Writers (read-write) Can collude to obtain more information 3 / 21
  • 7. Introduction ABE/ABS Proposal Performance Analysis Conclusion SYSTEM OVERVIEW 4 / 21
  • 8. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 9. Introduction ABE/ABS Proposal Performance Analysis Conclusion ATTRIBUTE-BASED ENCRYPTION Private key associated with attributes Access tree Tdecrypt Defines access policies over attributes Encrypt using access structure Decrypt if structure is satisfied Example “Directors or managers or a specifically appointed person (trustee) can access the data” 5 / 21
  • 10. Introduction ABE/ABS Proposal Performance Analysis Conclusion ATTRIBUTE-BASED SIGNATURE Users can sign resources Signatures are based on users’ attributes Users verify signatures Example “Only director-manager users or a specifically appointed person (trustee) can access the data” 6 / 21
  • 11. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 12. Introduction ABE/ABS Proposal Performance Analysis Conclusion DATA ACCESS PROCEDURES Create file Encrypt phase Sign phase Upload phase Read file Verify phase Decrypt phase Update file 7 / 21
  • 13. Introduction ABE/ABS Proposal Performance Analysis Conclusion CREATE FILE Encrypt phase Sign phase Upload phase 8 / 21
  • 14. Introduction ABE/ABS Proposal Performance Analysis Conclusion ENCRYPT PHASE The owner encrypts a file for sharing Based on ABE Decryption policy based on the tree Tdecrypt CT = Enc(PKE, M, Tdecrypt) Notation Description CT: ciphertext Enc: encryption algorithm PKE: public key for encryption M: message Tdecrypt: access tree 9 / 21
  • 15. Introduction ABE/ABS Proposal Performance Analysis Conclusion SIGN PHASE The owner signs the ciphertext using ABS Used to differentiate readers and writers SG = Sign(PKS, SKS, h(CT)||t, Tsign) Notation Description SG: signature Sign: sign algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree 10 / 21
  • 16. Introduction ABE/ABS Proposal Performance Analysis Conclusion UPLOAD PHASE The owner uploads CT, SG, t The server checks signature Accept or reject upload R0 = Verify(PKS, h(CT)||t, Tsign, SG) Notation Description R0: boolean verification value Verify: verification algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree SG: signature 11 / 21
  • 17. Introduction ABE/ABS Proposal Performance Analysis Conclusion READ FILE Verify phase Decrypt phase 12 / 21
  • 18. Introduction ABE/ABS Proposal Performance Analysis Conclusion VERIFY PHASE A user obtains CT, SG, t, Tsign Obtain public key PKS from trusted authority Verifies if the signature is valid R1 = Verify(PKS, h(CT)||t, Tsign, SG) Notation Description R1: boolean verification value Verify: verification algorithm PKS: public key for signing h: hash function CT: ciphertext t: timestamp Tsign: access tree SG: signature 13 / 21
  • 19. Introduction ABE/ABS Proposal Performance Analysis Conclusion DECRYPT PHASE Decrypts ciphertext using SKU M = Decrypt(CT, SKU) Notation Description M: message Decrypt: decryption algorithm CT: ciphertext SKU: key corresponding to attributes U 14 / 21
  • 20. Introduction ABE/ABS Proposal Performance Analysis Conclusion UPDATE FILE A user... Updates M to M1 Encrypts message: CT1 = Enc(PKE , M1, Tdecrypt1 ) Signs ciphertext: SG1 = Sign(PKS, SKS, h(CT1)||t1, Tsign) Uploads CT1, SG1, t1, Tsign The server... Verifies the new signature – Check writer’s attributes Accepts or rejects the update 15 / 21
  • 21. Introduction ABE/ABS Proposal Performance Analysis Conclusion WRITER-READER DIFFERENTIATION Users differentiated by ABS Writers can produce a valid signature Differentiation done at attribute level Scales better than at user level 16 / 21
  • 22. Introduction ABE/ABS Proposal Performance Analysis Conclusion INTEGRITY ABS offers integrity Hash ciphertext before signing The integrity can be verified by... Server Valid users 17 / 21
  • 23. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 24. Introduction ABE/ABS Proposal Performance Analysis Conclusion COMPUTATIONAL OVERHEAD Create and Update One encryption operation One sign operation Cost grows with access structure matrix Read One decryption operation One verify operation Cost grows with attributes satisfied Cost mainly generated by pairing computations 18 / 21
  • 25. Introduction ABE/ABS Proposal Performance Analysis Conclusion OUTLINE 1 Introduction 2 ABE/ABS 3 Proposal 4 Performance Analysis 5 Conclusion
  • 26. Introduction ABE/ABS Proposal Performance Analysis Conclusion SUMMARY Secure data sharing scheme Fine-grained access Many-read-many-write Integrity verification 19 / 21
  • 27. Introduction ABE/ABS Proposal Performance Analysis Conclusion FUTURE WORK Use search on encrypted data Many-read-many-write-many-search Implementation to verify usability 20 / 21
  • 29. Detailed Analysis COMPLEXITY ANALYSIS Create file O(E1 × log p) + O(l × E0 × log p) Read file O(l ×L)+O(|U|×E1 ×log p)+O(l ×E0 ×log p) Update file O(E1 × log p) + O(l × E0 × log p) Notation Description E0 Cost of exponentiation operations in G0 E1 Cost of exponentiation operations in G1 L Cost of bilinear pairing p Prime order of G0 and G1 U The attribute set in the access tree l, t The matrix l × t of the monotone span program which is con- verted from its corresponding access structure