Privacy-preserving attribute-based access control using homomorphic encryption

被引:0
|
作者
Kerl, Malte [1 ]
Bodin, Ulf [1 ]
Schelen, Olov [1 ]
机构
[1] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, Lulea, Sweden
来源
CYBERSECURITY | 2025年 / 8卷 / 01期
关键词
Non-interactive zero knowledge proof; Privacy preservation; Authentication; Confidentiality; Cyber security; Data protection; SECURITY;
D O I
10.1186/s42400-024-00323-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication and access control for Cyber-Physical Systems (CPSs) are pivotal for protecting systems and their users from problems related to harmful actions and the malicious use of retrieved data. In some situations, making access decisions requires using user information, thereby challenging their privacy. Attribute-based access control (ABAC) supports dynamic and context-aware access decisions that are attractive in cyber-physical system environments. However, privacy preservation for access decisions is an open issue for authorization and is not supported by existing ABAC models. For example, if access decisions need to be made based on private attribute values such as health data, the corresponding access control policies need to be revealed. This paper reviews the ABAC, homomorphic encryption (HE), and zero-knowledge proof (ZKP) approaches, confirming the gap in privacy preservation in ABAC. Based on this observation, we further present the application of a new ZKP-based protocol in which ABAC allows for the privacy-preserving evaluation of attributes. This protocol is implemented and evaluated in terms of its performance and security. The evaluation demonstrates that there is a possibility for privacy-preserving ABAC, which may benefit the use of CPS, e.g., in underground and open-pit mines.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370
  • [2] Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures
    Zhang, Liangxuan
    Li, Hui
    Zhang, Yinghui
    Khan, Fawad
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 475 - 482
  • [3] Constraints Validation in Privacy-Preserving Attribute-Based Access Control
    Oleshchuk, Vladimir
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOLS 1-2, 2015, : 429 - 431
  • [4] Privacy-preserving attribute-based access control for grid computing
    Park, Sang M.
    Chung, Soon M.
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (04) : 286 - 296
  • [5] Privacy-preserving Blockchain based IoT Ecosystem using Attribute-based Encryption
    Rahulamathavan, Yogachandran
    Phan, Raphael C-W
    Rajarajan, Muttukrishnan
    Misra, Sudip
    Kondoz, Ahmet
    2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2017,
  • [6] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Axin Wu
    Yinghui Zhang
    Xiaokun Zheng
    Rui Guo
    Qinglan Zhao
    Dong Zheng
    Annals of Telecommunications, 2019, 74 : 401 - 411
  • [7] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Wu, Axin
    Zhang, Yinghui
    Zheng, Xiaokun
    Guo, Rui
    Zhao, Qinglan
    Zheng, Dong
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 401 - 411
  • [8] Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption
    Liang, Pengfei
    Zhang, Leyou
    Shang, Yujie
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 66 - 80
  • [9] Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
    Petrlic, Ronald
    Sorge, Christoph
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [10] Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing
    Yogesh Deshmukh J.
    Yadav S.K.
    Bhandari G.M.
    Materials Today: Proceedings, 2023, 80 : 1786 - 1791