TY - JOUR
T1 - Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks
AU - Hahn, Changhee
AU - Kim, Jongkil
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2022/11/15
Y1 - 2022/11/15
N2 - Cloud-based Internet of Things (IoT) management services can be utilized to acquire data from devices at any point on Earth. Accordingly, controlling access to data managed by possibly untrusted cloud servers is crucial. Attribute-based encryption (ABE) provides flexible access control and the capability to delegate, facilitating decryption operations with high computationally costs to be outsourced to cloud servers. Earlier studies discussed guarantees to the accuracy of delegated computation through various cryptographic encoding techniques, thus helping data receivers verify the precision of outsourced decryption operations. In this article, we investigate two state-of-the-art schemes addressing verifiable outsourced decryption of encrypted data, and show their vulnerability to our verification bypassing attacks. We then propose a securitywise enhanced encoding scheme that disables such attacks. In addition, a rigorous security analysis is conducted, demonstrating the capabilities of the proposed scheme against bypassing attacks. An experimental analysis finds that the method proposed in this article outperforms the two state-of-the-art works by 82% and 87%, respectively, on the encoding computation cost.
AB - Cloud-based Internet of Things (IoT) management services can be utilized to acquire data from devices at any point on Earth. Accordingly, controlling access to data managed by possibly untrusted cloud servers is crucial. Attribute-based encryption (ABE) provides flexible access control and the capability to delegate, facilitating decryption operations with high computationally costs to be outsourced to cloud servers. Earlier studies discussed guarantees to the accuracy of delegated computation through various cryptographic encoding techniques, thus helping data receivers verify the precision of outsourced decryption operations. In this article, we investigate two state-of-the-art schemes addressing verifiable outsourced decryption of encrypted data, and show their vulnerability to our verification bypassing attacks. We then propose a securitywise enhanced encoding scheme that disables such attacks. In addition, a rigorous security analysis is conducted, demonstrating the capabilities of the proposed scheme against bypassing attacks. An experimental analysis finds that the method proposed in this article outperforms the two state-of-the-art works by 82% and 87%, respectively, on the encoding computation cost.
KW - Cloud computing
KW - encryption
KW - privacy
KW - security
UR - https://www.scopus.com/pages/publications/85132732479
U2 - 10.1109/JIOT.2022.3181684
DO - 10.1109/JIOT.2022.3181684
M3 - Article
AN - SCOPUS:85132732479
SN - 2327-4662
VL - 9
SP - 22559
EP - 22570
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 22
ER -