Privacy-preserving attribute-based access control using homomorphic encryption

被引:0
|
作者
Kerl, Malte [1 ]
Bodin, Ulf [1 ]
Schelen, Olov [1 ]
机构
[1] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, Lulea, Sweden
来源
CYBERSECURITY | 2025年 / 8卷 / 01期
关键词
Non-interactive zero knowledge proof; Privacy preservation; Authentication; Confidentiality; Cyber security; Data protection; SECURITY;
D O I
10.1186/s42400-024-00323-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication and access control for Cyber-Physical Systems (CPSs) are pivotal for protecting systems and their users from problems related to harmful actions and the malicious use of retrieved data. In some situations, making access decisions requires using user information, thereby challenging their privacy. Attribute-based access control (ABAC) supports dynamic and context-aware access decisions that are attractive in cyber-physical system environments. However, privacy preservation for access decisions is an open issue for authorization and is not supported by existing ABAC models. For example, if access decisions need to be made based on private attribute values such as health data, the corresponding access control policies need to be revealed. This paper reviews the ABAC, homomorphic encryption (HE), and zero-knowledge proof (ZKP) approaches, confirming the gap in privacy preservation in ABAC. Based on this observation, we further present the application of a new ZKP-based protocol in which ABAC allows for the privacy-preserving evaluation of attributes. This protocol is implemented and evaluated in terms of its performance and security. The evaluation demonstrates that there is a possibility for privacy-preserving ABAC, which may benefit the use of CPS, e.g., in underground and open-pit mines.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Privacy-Preserving Federated Learning Using Homomorphic Encryption
    Park, Jaehyoung
    Lim, Hyuk
    APPLIED SCIENCES-BASEL, 2022, 12 (02):
  • [22] Privacy-preserving Surveillance Methods using Homomorphic Encryption
    Bowditch, William
    Abramson, Will
    Buchanan, William J.
    Pitropakis, Nikolaos
    Hall, Adam J.
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 240 - 248
  • [23] Privacy-Preserving Swarm Learning Based on Homomorphic Encryption
    Chen, Lijie
    Fu, Shaojing
    Lin, Liu
    Luo, Yuchuan
    Zhao, Wentao
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 509 - 523
  • [24] Privacy-Preserving Biometric Matching Using Homomorphic Encryption
    Pradel, Gaetan
    Mitchell, Chris
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 494 - 505
  • [25] PriExpress: Privacy-Preserving Express Delivery with Fine-Grained Attribute-Based Access Control
    Li, Tao
    Zhang, Rui
    Zhang, Yanchao
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 333 - 341
  • [26] Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 285 - 291
  • [27] Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
    Qian, Huiling
    Li, Jiguo
    Zhang, Yichen
    Han, Jinguang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (06) : 487 - 497
  • [28] A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare
    Meng, Dacheng
    Luo, Entao
    Wang, Guojun
    PROCEEDINGS 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS 2016), 2016, : 299 - 306
  • [29] Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
    Huiling Qian
    Jiguo Li
    Yichen Zhang
    Jinguang Han
    International Journal of Information Security, 2015, 14 : 487 - 497
  • [30] Concepts and languages for privacy-preserving attribute-based authentication
    Camenisch, Jan
    Dubovitskaya, Maria
    Enderlein, Robert R.
    Lehmann, Anja
    Neven, Gregory
    Paquin, Christian
    Preiss, Franz-Stefan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 25 - 44