Secure data management system with traceability against internal leakage

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The management of sensitive data in an organization is not limited to use authentication and encrytion systems. Actually, malicious users inside of an organization will leak sensitive data to adversaries if the users are privileged to access to the data. In this study, we enable a manager to identify the traitor(s) inside of an organization from the leaked data. The essential technique is the fingerprinting for encrypted data. When a user decrypts a ciphertext using the secret key assigned to the user, the decrypted data involves the information associated with the user. We propose such an access control system by combining an attribute-based encryption scheme and fingerprinting scheme. The proposed method prevents a dishonest manager from framing innocent users by realizing the asymmetric protocol using the fingerprinting scheme based on a key management.

Original languageEnglish
Title of host publicationProceedings - 9th Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1486-1494
Number of pages9
ISBN (Electronic)9781538615423
DOIs
Publication statusPublished - Feb 5 2018
Event9th Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2017 - Kuala Lumpur, Malaysia
Duration: Dec 12 2017Dec 15 2017

Publication series

NameProceedings - 9th Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2017
Volume2018-February

Other

Other9th Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2017
Country/TerritoryMalaysia
CityKuala Lumpur
Period12/12/1712/15/17

ASJC Scopus subject areas

  • Artificial Intelligence
  • Human-Computer Interaction
  • Information Systems
  • Signal Processing

Fingerprint

Dive into the research topics of 'Secure data management system with traceability against internal leakage'. Together they form a unique fingerprint.

Cite this