The existent access control schemes (Ruj et al., 2012),
(Ruj et al., 2011), (Ruj et al., 2014) are based on
the Lewko’s decentralized attribute based encryption
scheme (Lewko and Waters, 2011). During the en-
cryption phase, the data owner has to perform one
pairing function ˆe(g
1
,g
1
) and 2n exponentiations in
G
T
to calculate each of C
1,i
. In addition, to calculate
C
2,i
and C
3,i
, the data owner performs 3n in G
1
. In the
data decryption phase, the data user performs n expo-
nentiations in G
T
and 2n pairing functions.
The zhao et al.’s proposal (Zhao et al., 2011) is
based on the use of the CP-ABE scheme proposed
by Bethencourt et al. (Bethencourt et al., 2007).
To encrypt the data file, the data owner performs
(2n + 1) exponentiations in G
1
and one exponentia-
tion in G
T
. The user while decrypting data performs
n + 1 exponentiations in G
T
and 2n + 1 pairing func-
tions. The proposals (Ruj et al., 2012),(Zhao et al.,
2011), (Ruj et al., 2014) are based on the use of the
attribute based signature scheme proposed by (Maji
et al., 2011). In order to sign the message, the user
performs 2 + 3n + 2nl exponentiations in G
1
, where
n is the number of rows of the access matrix A and l
presents the number of columns of A. In the verifi-
cation phase, the CSP has to perform 3 + 2n pairing
function and 2nl + 1 exponentiations in G
1
.
8 CONCLUSIONS
The growing need for secure cloud sharing services
and the attractive properties of the Attribute based
Cryptography lead us to combine them, thus, defining
an innovative solution to the data outsourcing security
and efficiency issues.
In this paper, we design a privacy preserving attribute
based framework for fine grained access control, for
dynamic groups in untrusted cloud storage environ-
ments. Our approach ensures the confidentiality of
outsourced data in public untrusted cloud servers and
defines efficient data sharing in dynamic groups. That
is, flexible access control policies are enforced among
users belonging to separate groups with different priv-
ileges. Our theoretical performances analysis shows
the efficiency of PAbAC in scalable data sharing,
while considering the impact of the cryptographic op-
erations at both the client and the cloud provider side.
ACKNOWLEDGEMENTS
This work is a part of the MOBIDOC project achieved
under the PASRI program, funded by the European
Union and administered by the ANPR.
REFERENCES
Health Insurance Portability and Accountability Act
(HIPAA). https://www.hipaa.com/about/.
Beimel, A. (1996). Secure schemes for secret sharing and
key distribution. PhD thesis, Technion-Israel Institute
of technology, Faculty of computer science.
Benaloh, J., Chase, M., Horvitz, E., and Lauter, K. (2009).
Patient controlled encryption: ensuring privacy of
electronic medical records. In The 2009 ACM work-
shop on Cloud computing security, pages 103–114.
ACM.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In IEEE
Symposium on Security and Privacy, 2007., pages
321–334.
Bobba, R., Fatemieh, O., Khan, F., Gunter, C., Khurana,
H., et al. (2006). Using attribute-based access con-
trol to enable attribute-based messaging. In The 22nd
Annual Computer Security Applications Conference,
pages 403–413. IEEE.
Chaum, D. and Van Heyst, E. (1991). Group signatures. In
Advances in CryptologyEUROCRYPT91, pages 257–
265. Springer.
Di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi,
S., Pelosi, G., and Samarati, P. (2010a). Encryption-
based policy enforcement for cloud storage. In Dis-
tributed Computing Systems Workshops (ICDCSW),
2010 IEEE 30th International Conference on, pages
42–51. IEEE.
Di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi,
S., and Samarati, P. (2007). Over-encryption: man-
agement of access control evolution on outsourced
data. In Proceedings of the 33rd international confer-
ence on Very large data bases, pages 123–134. VLDB
endowment.
Di Vimercati, S. D. C., Foresti, S., Livraga, G., and Sama-
rati, P. (2015). Selective and private access to out-
sourced data centers. In Handbook on Data Centers,
pages 997–1027. Springer.
Di Vimercati, S. D. C. D., Foresti, S., Jajodia, S., Para-
boschi, S., and Samarati, P. (2010b). Encryption poli-
cies for regulating access to outsourced data. ACM
Transactions on Database Systems (TODS), 35(2):12.
El Kaafarani, A., Chen, L., Ghadafi, E., and Davenport,
J. (2014a). Attribute-based signatures with user-
controlled linkability. In Cryptology and Network Se-
curity, pages 256–269. Springer.
El Kaafarani, A., Ghadafi, E., and Khader, D. (2014b).
Decentralized traceable attribute-based signatures. In
Topics in Cryptology–CT-RSA 2014, pages 327–348.
Springer.
Frikken, K. B., Li, J., and Atallah, M. J. (2006). Trust ne-
gotiation with hidden credentials, hidden policies, and
policy cycles. In NDSS. Citeseer.
Ghadafi, E. (2015). Stronger security notions for decen-
tralized traceable attribute-based signatures and more
efficient constructions. In Topics in Cryptology—CT-
RSA 2015, pages 391–409. Springer.
PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds
145