9 CONCLUSION
In this paper, we propose a novel cryptographic me-
chanism to ensure multi-level access control, based
on the use of an attribute based encryption scheme.
Our selective attribute based encryption mechanism
SABE, enables the enciphering user to encrypt the
same data content, based on an ABE aggregate access
tree, and the deciphering entity to decrypt the sub-
sets of data blocks with respect to a security level k
l
.
Indeed, SABE supports a fine grained access control
mechanism with low processing costs, which is di-
rectly inherited from the expressiveness of ciphertext-
policy attribute based encryption for defining access
policies. Additionally, our proposal is proven secure
against selective, non-adaptive chosen ciphertext at-
tacks in the generic group model. Besides, a quan-
titative comparison of SABE with the naive com-
puting approach shows the gain of our construction
with respect to the processing and communication
costs, especially due to the use of an aggregate access
structure. Finally, we present the potential of SABE
technique to support security and privacy in concrete
networking and computing applications.
REFERENCES
Ahn, J. H., Boneh, D., Camenisch, J., Hohenberger, S., She-
lat, A., and Waters, B. (2012). Computing on authen-
ticated data. In Proc. of TCC, LNCS.
Beimel, A. (2011). Secret-sharing schemes: A survey.
IWCC’11.
Belguith, S., Kaaniche, N., Jemai, A., Laurent, M., and At-
tia, R. (2016). Pabac: a privacy preserving attribute
based framework for fine grained access control in
clouds. In SECRYPT 2016: 13th International Confe-
rence on Security and Cryptography, volume 4, pages
133–146. Scitepress.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In Pro-
ceedings of the 2007 IEEE Symposium on Security
and Privacy, SP ’07, Washington, DC, USA. IEEE
Computer Society.
Boneh, D., Boyen, X., and Goh, E.-J. (2005). Hierarchical
Identity Based Encryption with Constant Size Cipher-
text. Springer Berlin Heidelberg.
Di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi,
S., Pelosi, G., and Samarati, P. (2010). Encryption-
based policy enforcement for cloud storage. In Dis-
tributed Computing Systems Workshops (ICDCSW),
2010 IEEE 30th International Conference on, pages
42–51. IEEE.
di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi,
S., and Samarati, P. (2013). On information leakage
by indexes over data fragments. In Data Engineering
Workshops (ICDEW), 2013 IEEE 29th International
Conference on, pages 94–98. IEEE.
Garg, S., Gentry, C., Halevi, S., Sahai, A., and Waters,
B. (2013). Attribute-based encryption for circuits
from multilinear maps. In Advances in Cryptology–
CRYPTO 2013, pages 479–499. Springer.
Hassler, H., Posch, R., and Risti
´
c, V. (1993). Unique Keys
Enabling Multithreshold Schemes. IIG-report-series /
Institutes for Information Processing Graz / Institute
fur Informationsverarbeitung Graz: IIG-report-series.
Institutes for Information Processing Graz.
Hohenberger, S., Sahai, A., and Waters, B. (2013). Full
domain hash from (leveled) multilinear maps and
identity-based aggregate signatures. In Advances in
Cryptology–CRYPTO 2013, pages 494–512. Springer.
Horv
´
ath, M. (2015). Attribute-based encryption optimized
for cloud computing. In SOFSEM 2015: Theory and
Practice of Computer Science, pages 566–577. Sprin-
ger.
Huang, Q., Yang, Y., and Shen, M. (2016). Secure and ef-
ficient data collaboration with hierarchical attribute-
based encryption in cloud computing. Future Genera-
tion Computer Systems.
Hur, J. and Noh, D. K. (2011). Attribute-based access con-
trol with efficient revocation in data outsourcing sys-
tems. IEEE Transactions on Parallel and Distributed
Systems, 22(7):1214–1221.
Jahid, S., Mittal, P., and Borisov, N. (2011). Easier:
Encryption-based access control in social networks
with efficient revocation. In The 6th ACM Symposium
on Information, Computer and Communications Se-
curity, pages 411–415. ACM.
Kaaniche, N. and Laurent, M. (2017a). Attribute based en-
cryption for multi-level access control policies. In SE-
CRYPT 2017: 14th International Conference on Secu-
rity and Cryptography, volume 6, pages 67–78. Scite-
press.
Kaaniche, N. and Laurent, M. (2017b). Data security and
privacy preservation in cloud storage environments
based on cryptographic mechanisms. Computer Com-
munications, 111:120–141.
Khan, F., Li, H., and Zhang, L. (2016). Owner specified ex-
cessive access control for attribute based encryption.
IEEE Access, 4:8967–8976.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based
encryption. In EUROCRYPT 2005, pages 457–473.
Springer.
Shamir, A. How to share a secret. Commun. ACM, 22(11).
Yu, S., Wang, C., Ren, K., and Lou, W. (2010). Attribute
based data sharing with attribute revocation. In The
5th ACM Symposium on Information, Computer and
Communications Security, pages 261–270.
SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control
167