Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing

被引:20
|
作者
Wang, Zhiwei [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Jiangsu, Peoples R China
[3] Shanghai Key Lab Informat Secur Integrated Manage, Shanghai 200240, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 87卷
基金
中国国家自然科学基金;
关键词
Fog-devices; ID-based proxy re-encryption; Access control; Auxiliary input; Leakage resilient; PUBLIC-KEY ENCRYPTION; CRYPTOGRAPHY;
D O I
10.1016/j.future.2017.12.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In fog computing, fog-devices are usually physically close to end-devices, and have a high speed connection with cloud servers. They provide good access control service for end-devices to cloud, if an ID-based proxy re-encryption scheme is deployed on them. Each file stored on a cloud server is encrypted using a symmetric key, and these keys are encrypted by a public master key which is stored in a fog-device. If an end-device want to access a file in cloud, then the fog-device re-encrypts these encapsulated symmetric keys from the master key to the key of the end-device. However, due to the geographic dispersion of fog devices, they are apt to be attacked by side channel attacks. In this work, we propose a leakage resilient ID based proxy re-encryption scheme in auxiliary input model. It can resist the continuous leakage of secret keys caused by side channel attacks. We implement our scheme over two platforms, and the results show that our scheme is feasible in practice. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:679 / 685
页数:7
相关论文
共 50 条
  • [31] Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment
    Khashan, Osama A.
    IEEE ACCESS, 2020, 8 : 66878 - 66887
  • [32] Identity Based Proxy Re-encryption Scheme under LWE
    Yin, Wei
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zheng Ping
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6116 - 6132
  • [33] An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    Sepehri, Maryam
    Damiani, Ernesto
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [34] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [35] Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, 2014, 8804 : 76 - +
  • [36] Proxy Re-encryption Scheme Based on BB2 Identity Based Encryption
    Yang, Xiaoyuan
    Wang, Xu An
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 134 - 137
  • [37] Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud
    Su M.
    Wang L.
    Fu A.
    Yu Y.
    Journal of Shanghai Jiaotong University (Science), 2018, 23 (5) : 666 - 670
  • [38] Securing Fog and Cloud Communication Using Attribute Based Access Control and Re-encryption
    Vohra, Kunal
    Dave, Mayank
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 307 - 312
  • [39] Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud
    苏铓
    汪良辰
    付安民
    俞研
    Journal of Shanghai Jiaotong University(Science), 2018, 23 (05) : 666 - 670
  • [40] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225