Abstract
The strong growth of communication and storage gives rise to the significantly increasing demand for storing and sharing big data on networks. Research studies and industry applications can apply analytic techniques for exploiting data, or Internet users can exchange data on social networks or peer-to-peer networks. However, securing this shared data is a challenging problem that attracts much attention to researchers. Sharing data with a group of users on peer-to-peer faces the unavailability problem of peer-to-peer nodes, so that users cannot download the shared data. This affects an application class of sharing and storing online services. In this paper, we propose a solution for sharing secured data on peer-to-peer applications using blockchain and attribute-based encryption. The attribute-based encryption guarantees sharing keys among a group of users, while blockchain guarantees keys distribution. We implement the solution on the mobile peer-to-peer network that provides services for sharing and storing data securely.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007)
Jamil, T.: The Rijndael algorithm. IEEE Potentials 23(2), 36–38 (2004)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Shankar, U., Kulik, A., Moller, B., Patel, A., Bershad, B.N., Erb, D.: Storing encrypted objects, December 2013
Flank, J.H., Klinkner, S.R., Swartzlander, B.B., Thompson, T.J., Yoder, A.G.: Centralized role-based access control for storage servers, March 2011
Greenfeld, K.T., Taro, K.: Meet the Napster. Time Mag. 2, 998068 (2000)
Cohen, B.: Incentives build robustness in BitTorrent. In: Proceedings of the Workshop on Economics of Peer-to-Peer systems, vol. 6, pp. 68–72 (2003)
He, H., Li, R., Dong, X., Zhang, Z.: Secure, efficient and fine-grained data access control mechanism for P2P storage cloud. IEEE Trans. Cloud Comput. 2(4), 471–484 (2014)
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122
Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of 5th ACM Symposium on Information, Computer and Communications Security, pp. 261–270 (2010)
Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of 4th International Symposium on Information, Computer, and Communications Security, pp. 276–286 (2009)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
Buterin, V., et al.: Ethereum white paper: a next generation smart contract & decentralized application platform. First version 53 (2014)
TomoChain R&D.: TomoChain: masternodes design technical white paper version 1.0. (2018)
Sahai, A., Waters, B.: Fuzzy identity based encryption. In: IACR Cryptology ePrint Archive (2004)
Goyal, V.K., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: IACR Cryptology ePrint Archive, vol. 2006, p. 309 (2006)
Zickau, S., Thatmann, D., Butyrtschik, A., Denisow, I., Küpper, A.: Applied attribute-based encryption schemes. In: Proceedings of 19th International Conference-Innovations in Clouds, Internet and Networks (ICIN 2016), pp. 88–95 (2016)
Akinyele, J.A., et al.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111–128 (2013)
Aggarwal, D., Brennen, G.K., Lee, T., Santha, M., Tomamichel, M.: Quantum attacks on bitcoin, and how to protect against them. arXiv preprint arXiv:1710.10377 (2017)
Wang, Y.: Lattice ciphertext policy attribute-based encryption in the standard model. Int. J. Netw. Secur. 16(6), 444–451 (2014)
Agrawal, S., Boyen, X., Vaikuntanathan, V., Voulgaris, P., Wee, H.: Functional encryption for threshold functions (or fuzzy IBE) from lattices. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 280–297. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30057-8_17
Qiao, Z., Liang, S., Davis, S., Jiang, H.: Survey of attribute based encryption. In: Proceedings of 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2014), pp. 1–6. IEEE (2014)
Acknowledgement
This research activity is funded by Hong Bang International University under the grant number GV2025.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Dang, N.T., Nguyen, V.S., Le, HD., Maleszka, M., Tran, M.H. (2020). Sharing Secured Data on Peer-to-Peer Applications Using Attribute-Based Encryption. In: Nguyen, N.T., Hoang, B.H., Huynh, C.P., Hwang, D., Trawiński, B., Vossen, G. (eds) Computational Collective Intelligence. ICCCI 2020. Lecture Notes in Computer Science(), vol 12496. Springer, Cham. https://doi.org/10.1007/978-3-030-63007-2_48
Download citation
DOI: https://doi.org/10.1007/978-3-030-63007-2_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-63006-5
Online ISBN: 978-3-030-63007-2
eBook Packages: Computer ScienceComputer Science (R0)