Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing

被引:20
|
作者
Wang, Zhiwei [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Jiangsu, Peoples R China
[3] Shanghai Key Lab Informat Secur Integrated Manage, Shanghai 200240, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 87卷
基金
中国国家自然科学基金;
关键词
Fog-devices; ID-based proxy re-encryption; Access control; Auxiliary input; Leakage resilient; PUBLIC-KEY ENCRYPTION; CRYPTOGRAPHY;
D O I
10.1016/j.future.2017.12.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In fog computing, fog-devices are usually physically close to end-devices, and have a high speed connection with cloud servers. They provide good access control service for end-devices to cloud, if an ID-based proxy re-encryption scheme is deployed on them. Each file stored on a cloud server is encrypted using a symmetric key, and these keys are encrypted by a public master key which is stored in a fog-device. If an end-device want to access a file in cloud, then the fog-device re-encrypts these encapsulated symmetric keys from the master key to the key of the end-device. However, due to the geographic dispersion of fog devices, they are apt to be attacked by side channel attacks. In this work, we propose a leakage resilient ID based proxy re-encryption scheme in auxiliary input model. It can resist the continuous leakage of secret keys caused by side channel attacks. We implement our scheme over two platforms, and the results show that our scheme is feasible in practice. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:679 / 685
页数:7
相关论文
共 50 条
  • [41] ID-based Encryption Scheme with Revocation
    Othman, Hafizul Azrie
    Ismail, Eddie Shahril
    4TH INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES (ICMS4): MATHEMATICAL SCIENCES: CHAMPIONING THE WAY IN A PROBLEM BASED AND DATA DRIVEN SOCIETY, 2017, 1830
  • [42] Performance Analysis of the Symmetric Proxy Re-encryption Scheme
    Meiliasari, Rizky Putri
    Syalim, Amril
    Yazid, Setiadi
    2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 91 - 96
  • [43] Data sharing using proxy re-encryption based on DNA computing
    Ahmed Elhadad
    Soft Computing, 2020, 24 : 2101 - 2108
  • [44] Data sharing using proxy re-encryption based on DNA computing
    Elhadad, Ahmed
    SOFT COMPUTING, 2020, 24 (03) : 2101 - 2108
  • [45] Improved Proxy Re-encryption Scheme with Equality Test
    Yang, Chih-Chen
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    Tseng, Yi-Fan
    2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 37 - 44
  • [46] Proxy Re-encryption Scheme from IBE to CBE
    Wang, Xu An
    Yang, Xiaoyuan
    Zhang, Minqing
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 99 - 102
  • [47] A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain
    Eltayieb, Nabeil
    Sun, Liang
    Wang, Ke
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 293 - 307
  • [48] Proxy Re-encryption Scheme based on New Multivariate Quadratic Assumptions
    Zhu, Shuaishuai
    Yang, Xiaoyuan
    JOURNAL OF COMPUTERS, 2013, 8 (12) : 3238 - 3242
  • [49] A Timed-Release Proxy Re-Encryption Scheme
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (08) : 1682 - 1695
  • [50] A new conditional proxy re-encryption scheme based on secret sharing
    Lan, C.-H. (lanzhourm@163.com), 1600, Science Press (36):