An efficient signcryption for data access control in cloud computing

被引:0
|
作者
Fagen Li
Bo Liu
Jiaojiao Hong
机构
[1] University of Electronic Science and Technology of China,Center for Cyber Security, School of Computer Science and Engineering
来源
Computing | 2017年 / 99卷
关键词
Cloud computing; Security; Access control; Signcryption; Identity-based cryptosystem; 94A60; 11T71;
D O I
暂无
中图分类号
学科分类号
摘要
Data storage is one of main services in cloud computing. How to ensure the confidentiality and authorized access of data is the central issue of data storage. In this paper, we propose a novel data access control scheme that can simultaneously achieve confidentiality and authentication for cloud computing. In this scheme, users store encrypted data in the cloud. When a user wants to access the data, the data owner delegates the cloud to re-encrypt the data and only the authorized user can decrypt the data. The cloud can not get any plaintext information about the data. In addition, the authorized user can verify the integrity and authentication of the data. We realize the data access control scheme by proposing an identity-based signcryption (IBSC) scheme with proxy re-encryption. We prove that the IBSC scheme has the indistinguishability against adaptive chosen ciphertext attack under the decisional bilinear Diffie-Hellman problem and existential unforgeability against adaptive chosen message attack under the computational Diffie-Hellman problem in the random oracle model.
引用
收藏
页码:465 / 479
页数:14
相关论文
共 50 条
  • [1] An efficient signcryption for data access control in cloud computing
    Li, Fagen
    Liu, Bo
    Hong, Jiaojiao
    [J]. COMPUTING, 2017, 99 (05) : 465 - 479
  • [2] Secure and efficient data access control in cloud computing environment: A survey
    Namasudra, Suyel
    Roy, Pinki
    [J]. MULTIAGENT AND GRID SYSTEMS, 2016, 12 (02) : 69 - 90
  • [3] Efficient decentralized access control for secure data sharing in cloud computing
    Liu, Tonglai
    Wu, Jigang
    Li, Jiaxing
    Li, Jingyi
    Li, Yidong
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (17):
  • [4] A Secure and Efficient Data Sharing Scheme with Outsourced Signcryption and Decryption in Mobile Cloud Computing
    Fugkeaw, Somchart
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON JOINT CLOUD COMPUTING (JCC 2021) / 2021 9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2021), 2021, : 72 - 79
  • [5] An efficient attribute-based hierarchical data access control scheme in cloud computing
    He, Heng
    Zheng, Liang-han
    Li, Peng
    Deng, Li
    Huang, Li
    Chen, Xiang
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [6] Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing
    Li, Qi
    Tian, Youliang
    Zhang, Yinghui
    Shen, Limin
    Guo, Jingjing
    [J]. IEEE ACCESS, 2019, 7 : 131534 - 131542
  • [7] Secure and efficient fine-grained data access control scheme in cloud computing
    Yang, Changsong
    Ye, Jun
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2015, 21 (04) : 259 - 271
  • [8] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    [J]. 2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [9] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [10] An Efficient Oblivious Random Data Access Scheme in Cloud Computing
    Liu, Hong
    Lu, Xiaojing
    Duan, Shengchen
    Zhang, Yushu
    Xiang, Yong
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (02) : 1940 - 1953