Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage

被引:35
|
作者
Guo, Cheng [1 ,2 ]
Luo, Ningqi [3 ]
Bhuiyan, Md Zakirul Alam [4 ]
Jie, Yingmo [1 ,2 ]
Chen, Yuanfang [5 ,6 ]
Feng, Bin [1 ,2 ]
Alam, Muhammad [7 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China
[3] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[4] Fordham Univ, Dept Comp & Informat Sci, Bronx, NY 10458 USA
[5] Guangdong Univ Petrochem Technol Maoming, Maoming, Peoples R China
[6] Univ Paris 06, Paris, France
[7] Inst Telecomunicacoes, Campus Univ Santiago, Lisbon, Portugal
基金
中国国家自然科学基金;
关键词
Data sharing; Dynamic cloud storage; Key-aggregate encryption; Leakage-resilient; ATTRIBUTE-BASED-ENCRYPTION; IDENTITY-BASED ENCRYPTION; ACCESS-CONTROL; ARCHITECTURE; CIPHERTEXTS; PRIVACY; NETWORK;
D O I
10.1016/j.future.2017.07.038
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sharing encrypted data with different users via public cloud storage is an important functionality. Therefore, we propose a key-aggregate authentication cryptosystem that can generate a constant-size key that supports flexible delegation of decryption rights for any set of ciphertexts. The size of the key is independent of the number of maximum ciphertexts, meaning that the expense of our scheme is stable no matter how frequently users upload files to the cloud server. In addition, the authentication process in our scheme solves the key-leakage problem of data sharing. The data owner can extract an aggregated key that includes indices of the ciphertexts, the identity of the delegate, and the expiration date of the key. The key with the public parameters is used by the cloud server to identity the person or entity requesting a download, allowing the cloud server to control the right to download. Remarkably, we proved that the authentication key cannot be forged, and the message in this key cannot be denied. The method that is used to achieve efficient and secure data sharing in dynamic cloud storage must be stable in expense and leakage-resilient. Our scheme simultaneously satisfies both of these requirements. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:190 / 199
页数:10
相关论文
共 50 条
  • [21] Efficient Verifiable Key-Aggregate Keyword Searchable Encryption for Data Sharing in Outsourcing Storage
    Wang, Xuqi
    Cheng, Xiangguo
    Xie, Yu
    [J]. IEEE ACCESS, 2020, 8 (08): : 11732 - 11742
  • [22] Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud Storage
    Gharjale, Pramila
    Mohod, Prakash
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION (ICCPEIC), 2015, : 325 - 329
  • [23] Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage
    Yao, Yanqing
    Zhai, Zhengde
    Liu, Jianwei
    Li, Zhoujun
    [J]. IEEE ACCESS, 2019, 7 : 164544 - 164555
  • [24] Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud
    Li, Tong
    Liu, Zheli
    Jia, Chunfu
    Fu, Zhangjie
    Li, Jin
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 21 - 43
  • [25] Leakage-Resilient Key-Aggregate Cryptosystem with Auxiliary Input
    Wang, Zhiwei
    Zhou, Lingyu
    [J]. 2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [26] A Nobel Cryptosystem for Group Data Sharing in Cloud Storage
    Banerjee, Rupam
    Chattopadhyay, Arup Kumar
    Nag, Amitava
    Bose, Kaushik
    [J]. 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 728 - 731
  • [27] Cryptographic Implementation of Aggregate-Key Encryption for Data Sharing in Cloud Storage
    Kendrekar, Priyanka P.
    Chavan, M. K.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 829 - 832
  • [28] Transformation Between Attribute-Based Encryption and Key-Aggregate Cryptosystem
    Fan, Chun-, I
    Tseng, Yi-Fan
    Cheng-Yuan, E.
    Huang, Jheng-Jia
    [J]. 2018 13TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2018), 2018, : 35 - 41
  • [29] Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
    Chen, Wei-Hao
    Fan, Chun-I
    Tseng, Yi-Fan
    [J]. 2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 70 - 73
  • [30] Anonymous User Authentication with Secured Storage and Sharing Of Data on Cloud
    Karad, Manisha D.
    Vaidya, Milind B.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 201 - 205