Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage

被引:3
作者
Guo, Cheng [1 ]
Luo, Ningqi [2 ]
Jie, Yingmo [3 ]
Bhuiyan, Md Zakirul Alam [4 ]
Chen, Yuanfang [5 ,6 ]
Alam, Muhammad [7 ]
机构
[1] Dalian Univ Technol, Sch Software, Key Lab UNSS Liaoning Prov, Dalian, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[3] Dalian Univ Technol Dalian, Sch Math Sci, Dalian, Peoples R China
[4] Fordham Univ, Dept Comp & Informat Sci, Bronx, NY 10458 USA
[5] Guangdong Univ Petrochem Technol, Maoming, Peoples R China
[6] Univ Paris 06, Paris, France
[7] Campus Univ Santiago, Inst Telecomunicacoes, Aveiro, Portugal
来源
2017 14TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS AND NETWORKS & 2017 11TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY & 2017 THIRD INTERNATIONAL SYMPOSIUM OF CREATIVE COMPUTING (ISPAN-FCST-ISCC) | 2017年
基金
中国国家自然科学基金;
关键词
data sharing; dynamic cloud storage; key-aggregate encryption; IDENTITY-BASED ENCRYPTION; ACCESS-CONTROL; CIPHERTEXTS;
D O I
10.1109/ISPAN-FCST-ISCC.2017.43
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sharing encrypted data with different users via public cloud storage is an important research issue. This paper proposes a key-aggregate authentication cryptosystem. The cryptosystem generates a constant-size key that supports flexible delegation of decryption rights for any set of ciphertexts. The key-size is independent of the number of maximum ciphertexts such that the expense of our scheme is stable no matter how frequently users upload files to the cloud server dynamically. In addition, the authentication process in our scheme solves the key-leakage problem of data sharing. Data owner can extract an aggregated key which includes ciphertexts' indices, delegatee's identity and expiration date of the key. The cloud server obtains the identity of download-applicant from the key with public parameter and then controls download right. This paper proves that the authentication key cannot be fudged and the message in this key cannot be denied. In order to achieve efficient and secure data sharing in dynamic cloud storage, the proposed method should be stable in expense, and should be leakage-resilient. Our scheme can satisfy both requirements.
引用
收藏
页码:242 / 249
页数:8
相关论文
共 17 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
[Anonymous], LNCS
[3]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[4]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[5]  
Chick G.C., 1989, P ADV CRYPTOLOGY CRY, V435, P316
[6]   Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions [J].
Chow, Sherman S. M. ;
Dodis, Yevgeniy ;
Rouselakis, Yannis ;
Waters, Brent .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :152-161
[7]   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage [J].
Chu, Cheng-Kang ;
Chow, Sherman S. M. ;
Tzeng, Wen-Guey ;
Zhou, Jianying ;
Deng, Robert H. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) :468-477
[8]   Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage [J].
Cui, Baojiang ;
Liu, Zheli ;
Wang, Lingyu .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2374-2385
[9]  
Guo FC, 2007, LECT NOTES COMPUT SC, V4575, P392
[10]   Fuzzy identity-based encryption [J].
Sahai, A ;
Waters, B .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :457-473