{"title":"Secure data management system with traceability against internal leakage","authors":"M. Kuribayashi, Takahiro Ueda, N. Funabiki","doi":"10.1109/APSIPA.2017.8282268","DOIUrl":null,"url":null,"abstract":"The management of sensitive data in an organization is not limited to use authentication and encrytion systems. Actually, malicious users inside of an organization will leak sensitive data to adversaries if the users are privileged to access to the data. In this study, we enable a manager to identify the traitor(s) inside of an organization from the leaked data. The essential technique is the fingerprinting for encrypted data. When a user decrypts a ciphertext using the secret key assigned to the user, the decrypted data involves the information associated with the user. We propose such an access control system by combining an attribute-based encryption scheme and fingerprinting scheme. The proposed method prevents a dishonest manager from framing innocent users by realizing the asymmetric protocol using the fingerprinting scheme based on a key management.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APSIPA.2017.8282268","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The management of sensitive data in an organization is not limited to use authentication and encrytion systems. Actually, malicious users inside of an organization will leak sensitive data to adversaries if the users are privileged to access to the data. In this study, we enable a manager to identify the traitor(s) inside of an organization from the leaked data. The essential technique is the fingerprinting for encrypted data. When a user decrypts a ciphertext using the secret key assigned to the user, the decrypted data involves the information associated with the user. We propose such an access control system by combining an attribute-based encryption scheme and fingerprinting scheme. The proposed method prevents a dishonest manager from framing innocent users by realizing the asymmetric protocol using the fingerprinting scheme based on a key management.