1 / 13

EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation

Sonia Jahid, Prateek Mittal, Nikita Borisov University of Illinois at Urbana-Champaign Presented by Nikita Borisov ASIACCS 2011. EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation. Motivation. Encryption. Encrypt social network data

tacey
Download Presentation

EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sonia Jahid, Prateek Mittal, Nikita Borisov University of Illinois at Urbana-Champaign Presented by Nikita Borisov ASIACCS 2011 EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation

  2. Motivation

  3. Encryption • Encrypt social network data • flyByNight [Lucas&Borisov’08] • NOYB [Guha et al.’09] • FaceCloak [Luo et al.’09] • Persona [Baden et al.’09] • Users directly control access • Grant access by distributing keys • Revoke access by…?

  4. Revocation Existing Data Re-encrypt Our Contribution: Efficient revocation without rekeying or re-encryption, by using a minimally trusted proxy Alice Bob Carol Diana Expensive!

  5. OR AND Colleague 1 Friend Neighbor System Architecture KeyGen Encrypt Setup Revoke /KeyProxy Decrypt Convert KeyProxy (Revoke Bob) PK, MK Alice Proxy CTcomponent Modified CTcomponent Carol Diana Bob friend, colleague colleague friend, neighbor

  6. Algorithms - Basic Idea(cf. [Naor&Pinkas’00]) Point to Determine, P(0) SK SKr,r1 SKr,r2 SKr,r3 SKr,r4 Convert CT CT’

  7. Security • Immediate revocation • As soon as proxy updated • Including past data • Minimally trusted proxy • Cannot decrypt data • Cannot “unrevoke” users even if compromised

  8. Evaluation

  9. Evaluation- Proxy Rekey

  10. Comparison • Conventional revocation • Rekey 500 friends: 5s • Decrypt 2000 items: 13s • Encrypt 2000 items: 36s • EASiER: 1.5s

  11. Evaluation - Conversion

  12. Conclusion • We introduced an efficient revocation scheme for ABE • Useful in OSNs • Potential uses in other ABE deployments • Open problems • Forward security of proxy • Stronger security proofs Sonia Jahid Prateek Mittal

  13. Questions? Sonia Jahid Prateek Mittal

More Related