به جمع مشترکان مگیران بپیوندید!

تنها با پرداخت 70 هزارتومان حق اشتراک سالانه به متن مقالات دسترسی داشته باشید و 100 مقاله را بدون هزینه دیگری دریافت کنید.

برای پرداخت حق اشتراک اگر عضو هستید وارد شوید در غیر این صورت حساب کاربری جدید ایجاد کنید

عضویت
جستجوی مقالات مرتبط با کلیدواژه

attribute-based encryption

در نشریات گروه برق
تکرار جستجوی کلیدواژه attribute-based encryption در نشریات گروه فنی و مهندسی
تکرار جستجوی کلیدواژه attribute-based encryption در مقالات مجلات علمی
  • Sedigheh Khajouei Nejad, Sam Jabbehdari *, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar
    Applying access control to encrypted data is a crucial aspect of network security. Although Attribute-Based Encryption (ABE) provides a suitable solution, it comes with limitations, primarily its high computational complexity due to the use of pairing operations. In this paper, we propose the first attribute-based encryption scheme based on RSA encryption, which is pairing-free and more efficient than previous pairing-based approaches. This scheme is particularly well-suited for lightweight applications such as those in the Internet of Things (IoT).
    The proposed encryption scheme is a Key-Policy Attribute-Based Encryption (KP-ABE) that allows its access policy to be any Boolean function in disjunctive normal form (DNF). Our scheme also addresses the challenge of key revocation, which is often problematic in ABE schemes. The key advantages of our scheme are its efficiency and simplicity compared to other ABE schemes, which typically rely on complex pairing operations. Additionally, we present an Attribute-Based Signature (ABS) scheme based on RSA.
    Keywords: Efficiency, RSA Encryption, Attribute-Based Encryption, Key Policy, Revocation, Access Policy, Attribute-Based Signature, Lightweight
  • Sina Abdollahi *, Javad Mohajeri, Mahmoud Salmasizadeh
    Ciphertext-policy attribute-based encryption(CP-ABE) is considered a promising solution for secure data sharing in the cloud environment. Although very well expressiveness in ABE constructions can be achieved using a linear secret sharing scheme(LSSS), there is a significant drawback in such constructions. In the LSSS-based ABE constructions, the number of heavy pairing operations increases with an increase in the number of required attributes in the decryption. In this paper, we propose an LSSS-based CP-ABE scheme with a fixed number of pairings(four pairings) during the decryption process. In our scheme increasing the number of required attributes in the decryption does not affect the number of pairings. The simulation shows that our scheme has significant advantages in the encryption and the decryption processes compared to previous schemes. In addition, we use the outsourcing method in the decryption to get better performance on the user side. The main burden of decryption computations is done by the cloud without revealing any information about the plaintext. Furthermore, in our revocation method, the users’ communication channels are not used during the revocation process. All of these features make our scheme suitable for applications such as IoT. The proposed scheme is selectively CPA-secure in the standard model.
    Keywords: Attribute-Based Encryption, Internet of Things, Outsourced Decryption, Revocation, Constant Number of Pairings
  • Sajjad Palanki, Alireza Shafieinejad *
    Reliable access control is a major challenge of cloud storage services. This paper presents a cloud-based file-sharing architecture with ciphertext-policy attribute-based encryption (CP-ABE) access control mechanism. In CP-ABE, the data owner can specify the ciphertext access structure, and if the user key satisfies this access structure, the user can decrypt the ciphertext. The trusted authority embeds the private key of each attribute in a so-called attribute access polynomial and stores its coefficients publicly on the cloud. By means of the access polynomial, each authorized user will be able to retrieve the private key of the attribute by using her/his owned pre-shard key. In contrast, the data owner encrypts the file with a randomly selected key, namely the cipher key. The data owner encrypts the cipher key by CP-ABE scheme with the desired policies. Further, the data owner can create a different polynomial called query access polynomial for multi-keyword searching. Finally, the data owner places the encrypted file along the encrypted cipher key and query access polynomial in the cloud. The proposed scheme supports fast attribute revocation using updating the corresponding access polynomial and re-encrypting the affected cipher keys by the cloud server. Moreover, most of the calculations at the decryption and searching phases are outsourced to the cloud server, thereby allowing the lightweight nodes with limited resources to act as data users. Our analysis shows that the proposed scheme is both secure and efficient.
    Keywords: Secure Cloud Storage, Attribute-Based Encryption, Attribute Revocation, Multi-Keyword Searching
  • علیرضا شفیعی نژاد*، محمدپیام الماسیان، سید مهدی سجادیه

    با توجه به رشد روزافزون فضای ابری و اشتراک فایل در این فضا، کنترل دسترسی قابل اعتماد و مناسب یک چالش جدی محسوب می شود. در این مقاله یک روش کنترل دسترسی مبتنی بر ترکیب بلاک چین عمومی با رمزنگاری مبتنی بر ویژگی (CP-ABE) ارایه شده است. در این معماری برای ذخیره سازی از فضای ابری استفاده می گردد. کنترل دسترسی با استفاده از بلاکچین عمومی در قالب قراردادهای هوشمند بین مالک داده و کاربر پیاده سازی می شود. مالک داده فایل را با کلید اصلی رمز می نماید و برای هر کاربر یک کلید تولید می کند و با استفاده از توزیع کلید مبتنی بر چندجمله ای دسترسی (access polynomial) ، امکان بازیابی کلید اصلی را به کاربران می دهد . کلید کاربر در قالب رمزنگاری مبتنی بر ویژگی روی بستر بلاک چین قرار گرفته و توسط قراراد هوشمند به کاربر دارای ویژگی های مورد نیاز تحویل داده می شود. الگوریتم رمزنگاری و ساختار کلیدها امکان لغو دسترسی سریع را فراهم می نماید. در این مدل از یک موجودیت قابل اعتماد TA به عنوان یک بخش درگیر در کنترل دسترسی استفاده می شود. بستر بلاک چین نیز امکان یک لاگ حسابرسی پذیر امن را عملیاتی می کند که می تواند همراه با تراکنش های مالی شفافیت مالی را نیز فراهم نماید. پیاده سازی های ما نشان می دهد که این معماری مقیاس پذیر بوده و کارآیی لازم را دارد. همچنین سرعت مناسبی در بسترهای سخت افزای و نرم افزاری مختلف تا 20000 کاربر را دارد.

    کلید واژگان: کنترل دسترسی، بلاک چین، رمزنگاری مبتنی بر ویژگی، دخیره سازی ابری، قرارداد هوشمند
    Alireza Shafieinejad *, MohmmadPayam Almasian, Mehdi Sajadieh

    Nowadays, Access Control becomes the main challenges of many cloud services such as file sharing. In this article we propose a Blockchain based access control framework using access polynomial. Particularly, access control is implemented as a smart contract between data owner and user. Data owner encrypts the file with cipher-key and store it into the cloud storage. The cipher-key is embedded into a polynomial, namely access polynomial, which is retrievable by the end-users via user-key. The user-key is encrypted using ABE scheme and securely transmitted to end-user. Both user’s request and data owner response are registered as Blockchain transactions which provide non-reputation logs. This method simply supports user’s revocation by updating the access polynomial. The implementation results shows that our scheme has an acceptable performance over 20000 users. This scheme is decentralized and fault tolerant. Trusted Authority is responsible for issuing attributes to the users. Smart Contract is also lightweight Component and interface for sending Transactions to Blockcahin.

    Keywords: Access control, Blockchain, Attribute-based encryption, Cloud storage, Smart Contract
  • Maryam Zarezadeh, Maede Ashouri Talouki *, Mohammad Siavashi

    Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records in a cloud system. In their scheme, encrypted EHRs are stored in multiple clouds to provide scalability and privacy. In addition, they considered a role-based access control (RBAC) such that for any user, an EHR access policy must be determined. They also encrypt the EHRs by the public keys of all users. So, for a large amount of EHRs, this scheme is not efficient. Furthermore, using RBAC for access policy makes the policy changing difficult. In their scheme, users cannot search on encrypted EHRs based on diseases and some physicians must participate in the data retrieval by a requester physician. In this paper, we address these problems by considering a ciphertext-policy attribute-based encryption (CP-ABE) which is conceptually closer to the traditional access control methods such as RBAC. Our secure scheme can retrieve encrypted EHR based on a specific disease. Furthermore, the proposed scheme guarantees the user access control and the anonymity of the user or data owner during data retrieval. Moreover, our scheme is resistant against collusion between unauthorized retrievers to access the data. The analysis shows that our scheme is secure and efficient for cloud-based EHRs.

    Keywords: Access Control, Electronic health record, Attribute-Based Encryption, EHR, Cloud Storage
نکته
  • نتایج بر اساس تاریخ انتشار مرتب شده‌اند.
  • کلیدواژه مورد نظر شما تنها در فیلد کلیدواژگان مقالات جستجو شده‌است. به منظور حذف نتایج غیر مرتبط، جستجو تنها در مقالات مجلاتی انجام شده که با مجله ماخذ هم موضوع هستند.
  • در صورتی که می‌خواهید جستجو را در همه موضوعات و با شرایط دیگر تکرار کنید به صفحه جستجوی پیشرفته مجلات مراجعه کنید.
درخواست پشتیبانی - گزارش اشکال