Skip to main content

HD-MAABE: Hierarchical Distributed Multi-Authority Attribute Based Encryption for Enabling Open Access to Shared Organizational Data

  • Conference paper
  • First Online:
International Conference on Intelligent Computing and Smart Communication 2019

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

Attribute Based Encryption (ABE) has emerged as an access control technique for sharing data in cloud environment. In systems using ABE, the data owners specify the recipients for their data on the basis of attributes carried by them. The users obtain the attributes from appropriate authorities. In the context of open access systems, data pertaining to an organization is used within the organization by the internal members and at the same time, it can be shared with the users outside the organization. Sometimes, such shared data could be of critical importance. For example, medical data of a patient owned by a hospital could be important for a doctor to provide him suitable treatment. In this case, any authorized doctor should be able to treat the patient. Current ABE based schemes exhibit some limitations in addressing attribute management and policy formation issues for open access systems. In this paper, a Hierarchical Distributed Multi-Authority Attribute Based Encryption (HD-MAABE) scheme is proposed, where the organization and standard attribute authorities issue the attributes. Internal users of the organization get their attributes issued from the organization and attribute authorities arranged in a hierarchy are responsible for issuing valid attributes to the users external to the organization. Arrangement of attribute authorities in a hierarchy makes the system easily scalable, as attribute authorities can be added through a simple attribute delegation mechanism. This also makes it possible to issue attributes in a distributed manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, Access control policies and languages. Int. J. Comput. Sci. Eng. 3(2), 94–102 (2007)

    Google Scholar 

  2. N. Dagdee, R. Vijaywargiya, Policy architecture for credential based access control in open access environment. J. Inf. Assur. Secur. 6, 039–047 (2011)

    Google Scholar 

  3. J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in IEEE Symposium on Security and Privacy (2007), pp. 321–334

    Google Scholar 

  4. V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in 13th ACM Conference on Computer and Communications Security (2006), pp. 89–98

    Google Scholar 

  5. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, W. Jonker, Mediated ciphertext-policy attribute-based encryption and its application, in International Workshop on Information Security Applications (2009), pp. 309–323

    Google Scholar 

  6. S. Yu, C. Wang, K. Ren, W. Lou, Attribute based data sharing with attribute revocation, in 5th ACM Symposium on Information, Computer and Communications Security (2010), pp. 261–270

    Google Scholar 

  7. B. Waters, Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, in International Workshop on Public Key Cryptography (2011), pp. 53–70

    Google Scholar 

  8. M. Chase, Multi-authority attribute based encryption, in Theory of Cryptography Conference (Springer, Berlin, Heidelberg, 2007), pp. 515–534

    Google Scholar 

  9. M. Chase, S.S. Chow, Improving privacy and security in multi-authority attribute-based encryption, in Proceedings of the 16th ACM Conference on Computer and Communications Security (2009), pp. 121–130

    Google Scholar 

  10. A. Lewko, B. Waters, Decentralizing attribute-based encryption, in Advances in Cryptology—EUROCRYPT 2011, vol. 6632, Lecture Notes in Computer Science, ed. by K.G. Paterson (Springer, Berlin, Heidelberg, 2011), pp. 568–588

    Chapter  Google Scholar 

  11. A. Sahai, B. Waters, Fuzzy identity-based encryption, in Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 22 (Springer, Berlin, Heidelberg, 2005), pp. 457–473

    Google Scholar 

  12. M. Li, S. Yu, Y. Zheng, K. Ren, W. Lou, Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)

    Article  Google Scholar 

  13. G. Wang, Q. Liu, J. Wu, Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, in Proceedings of the 17th ACM Conference on Computer and Communications Security (2010), pp. 735–737

    Google Scholar 

  14. Z. Wan, J.E. Liu, R.H. Deng, HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2012)

    Article  Google Scholar 

  15. R. Bobba, H. Khurana, M. Prabhakaran, Attribute-sets: a practically motivated enhancement to attribute-based encryption, in European Symposium on Research in Computer Security (Springer, Berlin, Heidelberg, 2009), pp. 587–604

    Google Scholar 

  16. Q. Huang, Y. Yang, M. Shen, Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Futur. Gener. Comput. Syst. 72, 239–249 (2017)

    Article  Google Scholar 

  17. E. Luo, Q. Liu, G. Wang, Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016)

    Article  Google Scholar 

  18. M. Horvath, Private key delegation in attribute-based encryption, in Mesterproba Conference of the Budapest University of Technology and Economics for Graduating MSc and First Year PhD Students (2015)

    Google Scholar 

  19. L. Ibraimi, Q. Tang, P. Hartel, W. Jonker, Efficient and provable secure ciphertext policy attribute-based encryption schemes, in International Conference on Information Security Practice and Experience (Springer, Berlin, Heidelberg, 2009), pp. 1–12

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reetu Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, R., Kanungo, P., Dagdee, N. (2020). HD-MAABE: Hierarchical Distributed Multi-Authority Attribute Based Encryption for Enabling Open Access to Shared Organizational Data. In: Singh Tomar, G., Chaudhari, N.S., Barbosa, J.L.V., Aghwariya, M.K. (eds) International Conference on Intelligent Computing and Smart Communication 2019. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-0633-8_18

Download citation

Publish with us

Policies and ethics