Simultaneous authentication and secrecy in identity-based data upload to cloud

被引:15
|
作者
Qin, Bo [1 ,2 ]
Wang, Huaqun [2 ,3 ]
Wu, Qianhong [2 ,4 ]
Liu, Jianwei [4 ]
Domingo-Ferrer, Josep [2 ]
机构
[1] Renmin Univ China, Sch Informat, Beijing, Peoples R China
[2] Univ Rovira & Virgili, Dept Comp Engn & Math, UNESCO Chair Data Privacy, E-43007 Tarragona, Catalonia, Spain
[3] Dalian Ocean Univ, Sch Informat Engn, Dalian, Peoples R China
[4] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
关键词
Cloud Computing; Authentication; Secrecy; Bilinear pairings; STRONGLY UNFORGEABLE SIGNATURES; SIGNCRYPTION SCHEME; SECURE; ENCRYPTION; EFFICIENT;
D O I
10.1007/s10586-013-0258-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most existing works to secure cloud devote to remote integrity check, search and computing on encrypted data. In this paper, we deal with simultaneous authentication and secrecy when data are uploaded to cloud. Observing that cloud is most interesting to companies in which multiple authorized employees are allowed to upload data, we propose a general framework for secure data upload in an identity-based setting. We present and employ identity-based signcryption (IBSC) to meet this goal. As it is shown that it is challenging to construct IBSC scheme in the standard model and most IBSC schemes are realized in the random oracle model which is regarded weak to capture the realistic adversaries, we propose a new IBSC scheme simultaneously performing encryption and signature with cost less than the signature-then-encryption approach. The identity based feature eliminates the complicated certificates management in signcryption schemes in the traditional public-key infrastructure (PKI) setting. Our IBSC scheme exploits Boneh et al.'s strongly unforgeable signature and Paterson et al.'s identity-based signature. The scheme is shown to satisfy semantic security and strong unforgeability. The security relies on the well-defined bilinear decision Diffie-Hellman (BDDH) assumption and the proof is given in the standard model. With our IBSC proposal, a secure data upload scheme is instantiated with simultaneous authentication and secrecy in a multi-user setting.
引用
收藏
页码:845 / 859
页数:15
相关论文
共 50 条
  • [31] Cryptanalysis on an Enhanced Identity-based Deniable Authentication Protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    [J]. 2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 549 - +
  • [32] An Identity-Based Authentication Protocol for Clustered ZigBee Network
    Chen, Wei
    Zhang, Xiaoshuan
    Tian, Dong
    Fu, Zetian
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2010, 6216 : 503 - 510
  • [33] Identity-based deniable authentication for ad hoc networks
    Fagen Li
    Pan Xiong
    Chunhua Jin
    [J]. Computing, 2014, 96 : 843 - 853
  • [34] Identity-based authentication model for multi-domain
    State Key Laboratory of Information Security, Institute of Software, Chinese Acad. of Sci., Beijing 100080, China
    [J]. Jisuanji Xuebao, 2006, 8 (1271-1281):
  • [35] An Authentication Scheme Using Identity-based Encryption & Blockchain
    Zhou, Beini
    Li, Hui
    Xu, Li
    [J]. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 561 - 566
  • [36] Identity-based deniable authentication protocol from pairings
    Liao, I-En
    Lee, Cheng-Chi
    Shiang, Wufeng
    Hwang, Min-Shiang
    [J]. PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2006, : 112 - +
  • [37] Authentication in dynamic groups using identity-based signatures
    Felde, Nils Gentschen
    Grundner-Culemann, Sophia
    Guggemos, Tobias
    [J]. 2018 14TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB 2018), 2018,
  • [38] A Secure Identity-based Deniable Authentication Protocol for MANETs
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    [J]. PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95
  • [39] Identity-Based Edge Computing Anonymous Authentication Protocol
    Kang, Naixin
    Ning, Zhenhu
    Zhang, Shiqiang
    Rehman, Sadaqat Ur
    Waqas
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 3931 - 3943
  • [40] Identity-based Authentication protocol with Paring of Tate on WSN
    Wang Wei-hong
    Cu Yi-ling
    Chen Tie-ming
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4599 - 4602