Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission

被引:1
|
作者
Mandal, Mriganka [1 ]
Sarkar, Ramprasad [2 ]
机构
[1] Indian Inst Technol Jodhpur, Dept Math, NH 65 Nagaur Rd, Karwar 342037, Rajasthan, India
[2] Indian Inst Technol Kharagpur, Dept Math, Kharagpur 721302, W Bengal, India
关键词
Internet of Things (IoT); Cloud computing; Data broadcasting; Intrusion tracing and prevention; Anonymity and data privacy; INDUSTRIAL INTERNET; ENCRYPTION SCHEME; SECURE; THINGS;
D O I
10.1016/j.jisa.2023.103584
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, cloud data broadcasting system has attracted intensive attention due to its universal applicability in various Internet-of-Things enabled real-life scenarios. Cloud data broadcasting with simultaneous individual transmission is an exciting data broadcasting variant that empowers any data broadcaster to distribute encrypted broadcast data to a subscribed consumer group and the personalized transmission to each group member simultaneously. Recently [IEEE Transactions on Broadcasting (2020)], a certificate based data broadcasting with simultaneous individual transmission scheme (Chen et al., 2020) is proposed with the aim to solve both key-escrow problem and certificate management problem, and it is claimed to provide subscriber's outsider anonymity under the nonstandard q-type security assumption with the existence of random oracles. Unfortunately, we can show that this most recent work of Chen et al. (2020) is not secure against insider attacks, meaning that their protocol cannot trace the system's traitor consumers who can resell the sensitive information for their own profit without valid authorization. Besides, the design of Chen et al. (2020) has significantly high communication bandwidth that is approvingly inconvenient for the Internet-of-Things facilitated low-powerful multimedia devices to reduce unnecessary burden on the encryption costs. We design a provably secure adaptive identity-based data broadcasting technique having simultaneous individual transmission with unbounded number of consumers that can concatenate two mutually orthogonal functionalities, namely consumer's outsider anonymity and traitor consumer traceability, in a cost-efficient way. Our framework exploits the most secure and advanced asymmetric Type-3 bilinear maps to defend against fault attacks and realizes security in the standard provable security model without the existence of any random oracle. On a positive note, our construction eliminates the q-type security assumption that is so far a plausible achievement compared to all the existing schemes in this area.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment
    Mandal, Mriganka
    Dutta, Ratna
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60
  • [2] Anonymity in traceable cloud data broadcast system with simultaneous individual messaging
    Mriganka Mandal
    [J]. International Journal of Information Security, 2021, 20 : 405 - 430
  • [3] Anonymity in traceable cloud data broadcast system with simultaneous individual messaging
    Mandal, Mriganka
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (03) : 405 - 430
  • [4] Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging
    Mandal, Mriganka
    Nuida, Koji
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 : 167 - 186
  • [5] Efficient identity-based data transmission for VANET
    Wan, Changsheng
    Zhang, Juan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (06) : 1861 - 1871
  • [6] Efficient identity-based data transmission for VANET
    Changsheng Wan
    Juan Zhang
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1861 - 1871
  • [7] Simultaneous authentication and secrecy in identity-based data upload to cloud
    Qin, Bo
    Wang, Huaqun
    Wu, Qianhong
    Liu, Jianwei
    Domingo-Ferrer, Josep
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 845 - 859
  • [8] Simultaneous authentication and secrecy in identity-based data upload to cloud
    Bo Qin
    Huaqun Wang
    Qianhong Wu
    Jianwei Liu
    Josep Domingo-Ferrer
    [J]. Cluster Computing, 2013, 16 : 845 - 859
  • [9] Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge
    Wan, Changsheng
    Phoha, Vir Virander
    Tang, Yuzhe
    Hu, Aiqun
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (02) : 1726 - 1739
  • [10] A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing
    Hundera, Negalign Wake
    Mei, Qian
    Xiong, Hu
    Geressu, Dagmawit Mesfin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 455 - 472