Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing

被引:20
|
作者
Wang, Zhiwei [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Jiangsu, Peoples R China
[3] Shanghai Key Lab Informat Secur Integrated Manage, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Fog-devices; ID-based proxy re-encryption; Access control; Auxiliary input; Leakage resilient; PUBLIC-KEY ENCRYPTION; CRYPTOGRAPHY;
D O I
10.1016/j.future.2017.12.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In fog computing, fog-devices are usually physically close to end-devices, and have a high speed connection with cloud servers. They provide good access control service for end-devices to cloud, if an ID-based proxy re-encryption scheme is deployed on them. Each file stored on a cloud server is encrypted using a symmetric key, and these keys are encrypted by a public master key which is stored in a fog-device. If an end-device want to access a file in cloud, then the fog-device re-encrypts these encapsulated symmetric keys from the master key to the key of the end-device. However, due to the geographic dispersion of fog devices, they are apt to be attacked by side channel attacks. In this work, we propose a leakage resilient ID based proxy re-encryption scheme in auxiliary input model. It can resist the continuous leakage of secret keys caused by side channel attacks. We implement our scheme over two platforms, and the results show that our scheme is feasible in practice. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:679 / 685
页数:7
相关论文
共 50 条
  • [1] PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing
    Su, Mang
    Wang, Liangchen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2754 - 2767
  • [2] Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
    Koo, Woo Kwon
    Hwang, Jung Yeon
    Lee, Dong Hoon
    INFORMATION PROCESSING LETTERS, 2009, 109 (23-24) : 1260 - 1262
  • [3] ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning
    Fan, Chun-, I
    Hsu, Ya-Wen
    Shie, Cheng-Han
    Tseng, Yi-Fan
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (04)
  • [4] Hierarchical Attribute Based Proxy Re-Encryption Access Control in Cloud Computing
    Chandar, P. Praveen
    Muthuraman, D.
    Rathinraj, M.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1565 - 1570
  • [5] Secure Group Communication Based on Distributed Parallel ID-based Proxy Re-encryption
    Zhang Minqing
    Wu Xuguang
    Han Yiliang
    Guo Yao
    2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 6364 - 6367
  • [6] Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
    Lin, Han-Yu
    Tsai, Tung-Tso
    Ting, Pei-Yih
    Fan, Yan-Rong
    SENSORS, 2023, 23 (05)
  • [7] Anonymous attribute-based proxy re-encryption for access control in cloud computing
    Zhang, Yinghui
    Li, Jin
    Chen, Xiaofeng
    Li, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2397 - 2411
  • [8] Proxy re-encryption based multi-factor access control scheme in cloud
    Su M.
    Shi G.
    Fu A.
    Yu Y.
    Jin W.
    Tongxin Xuebao/Journal on Communications, 2018, 39 (02): : 93 - 101
  • [9] A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
    Tang, Yongli
    Lian, Huanhuan
    Zhao, Zemao
    Yan, Xixi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02): : 339 - 352
  • [10] Fine-Grained Access Control Scheme Based on Improved Proxy Re-Encryption in Cloud
    Xu, Zhenwu
    Shen, Jinan
    Liang, Fang
    Chen, Yingjie
    JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2021, 25 (02) : 170 - 176