Skip to main content

Sharing Secured Data on Peer-to-Peer Applications Using Attribute-Based Encryption

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12496))

Abstract

The strong growth of communication and storage gives rise to the significantly increasing demand for storing and sharing big data on networks. Research studies and industry applications can apply analytic techniques for exploiting data, or Internet users can exchange data on social networks or peer-to-peer networks. However, securing this shared data is a challenging problem that attracts much attention to researchers. Sharing data with a group of users on peer-to-peer faces the unavailability problem of peer-to-peer nodes, so that users cannot download the shared data. This affects an application class of sharing and storing online services. In this paper, we propose a solution for sharing secured data on peer-to-peer applications using blockchain and attribute-based encryption. The attribute-based encryption guarantees sharing keys among a group of users, while blockchain guarantees keys distribution. We implement the solution on the mobile peer-to-peer network that provides services for sharing and storing data securely.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007)

    Google Scholar 

  2. Jamil, T.: The Rijndael algorithm. IEEE Potentials 23(2), 36–38 (2004)

    Article  Google Scholar 

  3. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  4. Shankar, U., Kulik, A., Moller, B., Patel, A., Bershad, B.N., Erb, D.: Storing encrypted objects, December 2013

    Google Scholar 

  5. Flank, J.H., Klinkner, S.R., Swartzlander, B.B., Thompson, T.J., Yoder, A.G.: Centralized role-based access control for storage servers, March 2011

    Google Scholar 

  6. Greenfeld, K.T., Taro, K.: Meet the Napster. Time Mag. 2, 998068 (2000)

    Google Scholar 

  7. Cohen, B.: Incentives build robustness in BitTorrent. In: Proceedings of the Workshop on Economics of Peer-to-Peer systems, vol. 6, pp. 68–72 (2003)

    Google Scholar 

  8. He, H., Li, R., Dong, X., Zhang, Z.: Secure, efficient and fine-grained data access control mechanism for P2P storage cloud. IEEE Trans. Cloud Comput. 2(4), 471–484 (2014)

    Article  Google Scholar 

  9. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122

    Chapter  Google Scholar 

  10. Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of 5th ACM Symposium on Information, Computer and Communications Security, pp. 261–270 (2010)

    Google Scholar 

  11. Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of 4th International Symposium on Information, Computer, and Communications Security, pp. 276–286 (2009)

    Google Scholar 

  12. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

  13. Buterin, V., et al.: Ethereum white paper: a next generation smart contract & decentralized application platform. First version 53 (2014)

    Google Scholar 

  14. TomoChain R&D.: TomoChain: masternodes design technical white paper version 1.0. (2018)

    Google Scholar 

  15. Sahai, A., Waters, B.: Fuzzy identity based encryption. In: IACR Cryptology ePrint Archive (2004)

    Google Scholar 

  16. Goyal, V.K., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: IACR Cryptology ePrint Archive, vol. 2006, p. 309 (2006)

    Google Scholar 

  17. Zickau, S., Thatmann, D., Butyrtschik, A., Denisow, I., Küpper, A.: Applied attribute-based encryption schemes. In: Proceedings of 19th International Conference-Innovations in Clouds, Internet and Networks (ICIN 2016), pp. 88–95 (2016)

    Google Scholar 

  18. Akinyele, J.A., et al.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111–128 (2013)

    Article  Google Scholar 

  19. Aggarwal, D., Brennen, G.K., Lee, T., Santha, M., Tomamichel, M.: Quantum attacks on bitcoin, and how to protect against them. arXiv preprint arXiv:1710.10377 (2017)

  20. Wang, Y.: Lattice ciphertext policy attribute-based encryption in the standard model. Int. J. Netw. Secur. 16(6), 444–451 (2014)

    Google Scholar 

  21. Agrawal, S., Boyen, X., Vaikuntanathan, V., Voulgaris, P., Wee, H.: Functional encryption for threshold functions (or fuzzy IBE) from lattices. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 280–297. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30057-8_17

    Chapter  Google Scholar 

  22. Qiao, Z., Liang, S., Davis, S., Jiang, H.: Survey of attribute based encryption. In: Proceedings of 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2014), pp. 1–6. IEEE (2014)

    Google Scholar 

Download references

Acknowledgement

This research activity is funded by Hong Bang International University under the grant number GV2025.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Nhan Tam Dang or Hai-Duong Le .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dang, N.T., Nguyen, V.S., Le, HD., Maleszka, M., Tran, M.H. (2020). Sharing Secured Data on Peer-to-Peer Applications Using Attribute-Based Encryption. In: Nguyen, N.T., Hoang, B.H., Huynh, C.P., Hwang, D., Trawiński, B., Vossen, G. (eds) Computational Collective Intelligence. ICCCI 2020. Lecture Notes in Computer Science(), vol 12496. Springer, Cham. https://doi.org/10.1007/978-3-030-63007-2_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63007-2_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63006-5

  • Online ISBN: 978-3-030-63007-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics