Security
Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based
Encryption Scheme
ABSTRACT:
In a decentralized attribute-based encryption (ABE)
system, any party can act as an authority by creating a public key and issuing
private keys to different users that reflect their attributes without any
collaboration. Such an ABE scheme can eliminate the burden of heavy
communication and collaborative computation in the setup phase of
multi-authority ABE schemes, thus is considered more preferable. Recently in
IEEE Trans. Parallel Distrib. Syst., Han et al. [3] proposed an interesting
privacy-preserving decentralized key-policy ABE scheme, which was claimed to
achieve better privacy for users and to be provably secure in the standard
model. However, after carefully revisiting the scheme, we conclude that their
scheme cannot resist the collusion attacks, hence fails to meet the basic
security definitions of the ABE system.
EXISTING SYSTEM:
As attribute-based encryption (ABE) can
simultaneously provide flexible access control and data confidentiality
functionalities, it has become a promising technique for building secure access
in practical distributed systems. Very recently, Han et al. proposed a
decentralized key-policy ABE scheme in the standard model, based on which, they
proposed a privacy preserving key extraction protocol to protect the user’s
identifier. They also claimed that they solved the challenging open problem
left by Chase and Chow by constructing a privacy preserving multi-authority ABE
scheme without interactions among the authorities
DISADVANTAGES
OF EXISTING SYSTEM:
However, after carefully analyzing the existing scheme,
we found that this scheme is vulnerable to the collusion attack, which is a
basic security requirements for ABEs systems.
PROPOSED SYSTEM:
Recently in IEEE Trans. Parallel Distrib. Syst., Han
et al. [3] proposed an interesting privacy-preserving decentralized key-policy
ABE scheme, which was claimed to achieve better privacy for users and to be
provably secure in the standard model. However, after carefully revisiting the
scheme, we conclude that their scheme cannot resist the collusion attacks,
hence fails to meet the basic security definitions of the ABE system.
We propose a new system that can resist collusion attacks.
ADVANTAGES
OF PROPOSED SYSTEM:
Overcome the drawback of collusion attacks which is
in existing system.
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
ü Processor - Pentium –IV
ü Speed - 1.1
Ghz
ü RAM - 256
MB(min)
ü Hard
Disk - 20
GB
ü Key
Board - Standard
Windows Keyboard
ü Mouse - Two
or Three Button Mouse
ü Monitor - SVGA
SOFTWARE CONFIGURATION:-
ü Operating System :
Windows XP
ü Programming Language : JAVA
ü Java Version : JDK 1.6 & above.
REFERENCE:
Aijun Ge, Jiang Zhang, Rui Zhang,
Chuangui Ma, and Zhenfeng Zhang, “Security Analysis of a Privacy-Preserving
Decentralized Key-Policy Attribute-Based Encryption Scheme”, IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, 2013.