Affiliation:
1. College of Physical Education, Harbin University, Harbin 150090, China
2. College of Data Science and Technology, Heilongjiang University, Harbin 150080, China
Abstract
In many universities, students’ physical ability data are collected and stored in the cloud through various sensing devices to save computational and storage costs. Therefore, how to effectively access data while ensuring data security has become an urgent issue. Key-policy attribute-based encryption (KP-ABE) not only enables secure one-to-many communication and fine-grained access control but also adapts to data sharing in static scenarios, making it more suitable for the cloud sharing of physical ability data. In this paper, we construct an online/offline multi-authority key-policy attribute-based encryption with a cryptographic reverse firewall for physical ability data. This scheme uses multi-authority to avoid the single point of failure crisis of a single authority, and is combined with a cryptographic reverse firewall to resist backdoor attacks. In addition, the scheme uses outsourcing decryption to save users’ computing costs, and utilizes offline/online technology to move a large amount of computing offline, reducing the online burden. Finally, the experiment shows the feasibility of the scheme.
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference31 articles.
1. Li, J., Peng, J., and Qiao, Z. (2022). A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment. Big Data, ahead of print.
2. Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM conference on Computer and Communications Security, Alexandria, VA, USA.
3. Yamada, S., Attrapadung, N., Hanaoka, G., and Kunihiro, N. (2014, January 26–28). A framework and compact constructions for non-monotonic attribute-based encryption. Public-Key Cryptography—PKC 2014, Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina. Proceedings 17.
4. Attrapadung, N., Hanaoka, G., and Yamada, S. (December, January 29). Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. Advances in Cryptology–ASIACRYPT 2015, Proceedings of the 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand. Proceedings, Part I 21.
5. Attribute-based encryption for cloud computing access control: A survey;Zhang;ACM Comput. Surv. (CSUR),2020