cess control policies’ management in remote and dis-
tributed infrastructures. Indeed, different decipher-
ing keys can be distributed to different users that
are allowed to access the corresponding data content,
with respect to their granted privileges. However, the
translation of an access control list into an equiva-
lent multi-level policy remains the main issue of these
schemes.
To forbid access to some parts of data, some pro-
cesses propose to black out or remove these parts.
These processes are referred to as redaction mecha-
nisms (Miyazaki et al., 2006) (Steinfeld et al., 2002),
(Johnson et al., 2002), (Ateniese et al., 2005).
Generally, the proposed schemes rely on mal-
leable cryptographic primitives (e.g; chameleon hash
functions instead of the usual hash functions) in order
to allow redactors having their own secret key to mod-
ify some portions of the originally signed data file.
Although these techniques permit selective access to
some parts of data, they are also still inefficient with
multi-level access privileges.
In 2010, Di Vimercati et al. (Di Vimercati et al.,
2010) present a selective authorization policy model
based on graph theory in order to ensure read priv-
ilege. In their proposal, the authors consider a dy-
namic group of users sharing data stored in remote
cloud servers and assume that each data content may
only be accessed by a subset of users. Indeed, for con-
trolling data access, (Di Vimercati et al., 2010) relies
on the use of both a key agreement algorithm and a
key derivation algorithm that enables a key to be de-
rived from another key and a public token. The com-
bination of these two algorithms is able to correctly
convert access policies defined by data owners into
encryption policies. Afterwards, in 2012, Raykova et
al. (Raykova et al., 2012) present an access control
scheme that additionally supports the modification of
the accessed data file. That is, in order to differenti-
ate between read and write privileges, a public-private
key pair for each data file is provided at the fine-
grained level. Further, two token trees are built to dis-
tribute the private and public keys, respectively used
to enforce read and write privileges. Recently, Di
Vimercati et al. (di Vimercati et al., 2013) present an-
other approach to support modification of outsourced
data files. The basic idea of this approach is to as-
sociate each content with a write tag. The remote
server allows a user to perform a write operation on a
file if he correctly shows the corresponding write tag.
A crucial concern of the (di Vimercati et al., 2013)
scheme is that the keys used to encrypt write tags
have to be shared between authorized users and the
server. Although the attractive advantages of the pro-
posed solutions (Di Vimercati et al., 2010), (di Vimer-
cati et al., 2013), (Raykova et al., 2012) to support se-
lective access control, they do not support multi-level
access structure on the same data content.
Along with the different emerging techniques sup-
porting multi-level access control to encrypted data,
Attribute based Encryption (ABE) has been often pre-
sented as a solution to provide flexible data sharing
(Sahai and Waters, 2005), (Bethencourt et al., 2007).
In 2005, Sahai and Waters introduced the concept of
ABE as a new technique for encrypted access con-
trol (Sahai and Waters, 2005). Contrary to traditional
public key encryption mechanisms, both users’ pri-
vate keys and ciphertexts are associated with a set of
attributes or a structure over attributes. The user is
able to decrypt a ciphertext if there is a match between
his private key and the ciphertext. Several works
rely on ABE to realize fine grained access control
for outsourced data (Hur and Noh, 2011),(Yu et al.,
2010),(Jahid et al., 2011), (Ruj, 2014), (Horv
´
ath,
2015), (Huang et al., 2016). Although these schemes
proposed efficient solutions to protect outsourced data
from unauthorized access, they are still inefficient
with multi-level access policies, where users have
to share the same data content with different access
rights to distinct parts of the data file.
2.1 E-health Scenario
In a real e-health scenario, different medical organi-
sations and actors can be involved such as hospitals,
research laboratories, pharmacies, health ministry as
well as doctors, nurses and patients. On one hand, the
shared data have to be protected from unauthorized
access while ensuring fine grained access control for
different authorized actors. Thus, the data confiden-
tiality must be preserved against malicious users. As
such, encryption should be applied while supporting
flexible sharing of encrypted outsourced data among
dynamic group of users, with fine-grained access con-
trol policies.
On the other hand, the private identifying infor-
mation of the involved users, such as doctors and pa-
tients, must not be revealed to unauthorized actors.
For instance, the system should not reveal any private
information related to a doctor, such as his profes-
sional card, as well as his patients’ personal data. In-
deed, the disclosure of such information may be used
to produce targeted advertisement related to the health
condition of the patients or to run statistical surveys.
Let us consider the following use case: a doctor
wants to partially share parts of the medical record
of his patient with respect to different access control
policies. For instance, he shares the health status of
his patient with other doctors working in the cardi-
SECRYPT 2017 - 14th International Conference on Security and Cryptography
68