Simultaneous authentication and secrecy in identity-based data upload to cloud

被引:15
|
作者
Qin, Bo [1 ,2 ]
Wang, Huaqun [2 ,3 ]
Wu, Qianhong [2 ,4 ]
Liu, Jianwei [4 ]
Domingo-Ferrer, Josep [2 ]
机构
[1] Renmin Univ China, Sch Informat, Beijing, Peoples R China
[2] Univ Rovira & Virgili, Dept Comp Engn & Math, UNESCO Chair Data Privacy, E-43007 Tarragona, Catalonia, Spain
[3] Dalian Ocean Univ, Sch Informat Engn, Dalian, Peoples R China
[4] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
关键词
Cloud Computing; Authentication; Secrecy; Bilinear pairings; STRONGLY UNFORGEABLE SIGNATURES; SIGNCRYPTION SCHEME; SECURE; ENCRYPTION; EFFICIENT;
D O I
10.1007/s10586-013-0258-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most existing works to secure cloud devote to remote integrity check, search and computing on encrypted data. In this paper, we deal with simultaneous authentication and secrecy when data are uploaded to cloud. Observing that cloud is most interesting to companies in which multiple authorized employees are allowed to upload data, we propose a general framework for secure data upload in an identity-based setting. We present and employ identity-based signcryption (IBSC) to meet this goal. As it is shown that it is challenging to construct IBSC scheme in the standard model and most IBSC schemes are realized in the random oracle model which is regarded weak to capture the realistic adversaries, we propose a new IBSC scheme simultaneously performing encryption and signature with cost less than the signature-then-encryption approach. The identity based feature eliminates the complicated certificates management in signcryption schemes in the traditional public-key infrastructure (PKI) setting. Our IBSC scheme exploits Boneh et al.'s strongly unforgeable signature and Paterson et al.'s identity-based signature. The scheme is shown to satisfy semantic security and strong unforgeability. The security relies on the well-defined bilinear decision Diffie-Hellman (BDDH) assumption and the proof is given in the standard model. With our IBSC proposal, a secure data upload scheme is instantiated with simultaneous authentication and secrecy in a multi-user setting.
引用
收藏
页码:845 / 859
页数:15
相关论文
共 50 条
  • [1] Simultaneous authentication and secrecy in identity-based data upload to cloud
    Bo Qin
    Huaqun Wang
    Qianhong Wu
    Jianwei Liu
    Josep Domingo-Ferrer
    [J]. Cluster Computing, 2013, 16 : 845 - 859
  • [2] Identity-Based Authentication for Cloud Computing
    Li, Hongwei
    Dai, Yuanshun
    Tian, Ling
    Yang, Haomiao
    [J]. CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 157 - 166
  • [3] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    [J]. 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [4] Identity-based data storage in cloud computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 673 - 681
  • [5] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [6] Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment
    Mandal, Mriganka
    Dutta, Ratna
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60
  • [7] Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission
    Mandal, Mriganka
    Sarkar, Ramprasad
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [8] Identity-based authentication protocol for grid
    Li Hongwei
    [J]. Journal of Systems Engineering and Electronics, 2008, (04) : 860 - 865
  • [9] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    [J]. ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [10] Identity-based authentication protocol for grid
    Li Hongwei
    Sun Shixin
    Yang Haomiao
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 860 - COVER3