Simultaneous authentication and secrecy in identity-based data upload to cloud

被引:15
|
作者
Qin, Bo [1 ,2 ]
Wang, Huaqun [2 ,3 ]
Wu, Qianhong [2 ,4 ]
Liu, Jianwei [4 ]
Domingo-Ferrer, Josep [2 ]
机构
[1] Renmin Univ China, Sch Informat, Beijing, Peoples R China
[2] Univ Rovira & Virgili, Dept Comp Engn & Math, UNESCO Chair Data Privacy, E-43007 Tarragona, Catalonia, Spain
[3] Dalian Ocean Univ, Sch Informat Engn, Dalian, Peoples R China
[4] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
关键词
Cloud Computing; Authentication; Secrecy; Bilinear pairings; STRONGLY UNFORGEABLE SIGNATURES; SIGNCRYPTION SCHEME; SECURE; ENCRYPTION; EFFICIENT;
D O I
10.1007/s10586-013-0258-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most existing works to secure cloud devote to remote integrity check, search and computing on encrypted data. In this paper, we deal with simultaneous authentication and secrecy when data are uploaded to cloud. Observing that cloud is most interesting to companies in which multiple authorized employees are allowed to upload data, we propose a general framework for secure data upload in an identity-based setting. We present and employ identity-based signcryption (IBSC) to meet this goal. As it is shown that it is challenging to construct IBSC scheme in the standard model and most IBSC schemes are realized in the random oracle model which is regarded weak to capture the realistic adversaries, we propose a new IBSC scheme simultaneously performing encryption and signature with cost less than the signature-then-encryption approach. The identity based feature eliminates the complicated certificates management in signcryption schemes in the traditional public-key infrastructure (PKI) setting. Our IBSC scheme exploits Boneh et al.'s strongly unforgeable signature and Paterson et al.'s identity-based signature. The scheme is shown to satisfy semantic security and strong unforgeability. The security relies on the well-defined bilinear decision Diffie-Hellman (BDDH) assumption and the proof is given in the standard model. With our IBSC proposal, a secure data upload scheme is instantiated with simultaneous authentication and secrecy in a multi-user setting.
引用
收藏
页码:845 / 859
页数:15
相关论文
共 50 条
  • [41] Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
    He, Debiao
    Wang, Huaqun
    Zhang, Jianhong
    Wang, Lina
    [J]. INFORMATION SCIENCES, 2017, 375 : 48 - 53
  • [42] Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
    Liu, Zhangyun
    Liao, Yongjian
    Yang, Xiaowei
    He, Yichuan
    Zhao, Kun
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 128 - 135
  • [43] Genuine and Secure Identity-Based Public Audit for the Stored Data in Healthcare Cloud
    Zhang, Jianhong
    Sun, Zhibin
    Mao, Jian
    [J]. JOURNAL OF HEALTHCARE ENGINEERING, 2018, 2018
  • [44] Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography
    Guesmi, Houda
    Sadiane, Leila Azouz
    [J]. 2017 25TH INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING (ICSENG), 2017, : 324 - 330
  • [45] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [46] An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1359 - 1371
  • [47] Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 577 - 585
  • [48] Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data
    Tian, Hui
    Peng, Fang
    Quan, Hanyu
    Chang, Chin-Chen
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [49] Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Deng, Robert H.
    Wang, Yujue
    Zhou, Yunya
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3168 - 3180
  • [50] Cloud data integrity checking with an identity-based auditing mechanism from RSA
    Yu, Yong
    Xue, Liang
    Au, Man Ho
    Susilo, Willy
    Ni, Jianbing
    Zhang, Yafang
    Vasilakos, Athanasios V.
    Shen, Jian
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 85 - 91