Privacy preserved secured outsourced cloud data access control scheme with efficient multi-authority attribute based signcryption

被引:1
作者
Debnath, Somen [1 ]
Bhuyan, Bubu [2 ]
Saha, Anish Kumar [3 ]
机构
[1] Mizoram Univ, Dept Informat Technol, Aizawl 796004, Mizoram, India
[2] North Eastern Hill Univ, Dept Informat Technol, Shillong 793022, Meghalaya, India
[3] Natl Inst Technol Silchar, Dept Comp Sci & Engn, Silchar 788010, Assam, India
关键词
Signcryption; cloud computing; data outsourcing; public verifiablity; owner privacy; attribute revocation; PERSONAL HEALTH RECORDS;
D O I
10.3233/MGS-200338
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy preserved outsourced data access control is a hard task under the control of thirdfiASparty storage server. To overcome obstacles in the third party based scenario, Attribute-based signcryption system with bilinear pairing tool is one of the most suitable methods in cloud. It maintains the basic features of security like, authenticity, confidentiality, public verifiability, owner privacy, etc. Although, this method has some challenges like a centralized authority used for user secret key generation for de-signcryption operation, and lack in competent attribute revocation. To overcome the issues, we have proposed a scheme of attribute revocable privacy preserved outsourced based data access control mechanism using Attribute-based signcryption. The proposed method allows multi-authorities for assigning both attribute and secret keys for users along with trusted certified authority, which provides security parameters. The analysis of the proposed method shows less computation cost in decryption and authentication verification. The almost same performance and efficiency is found while comparing with the existing schemes after adding new features.
引用
收藏
页码:409 / 432
页数:24
相关论文
共 20 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[3]  
Cheng Chen, 2012, Provable Security. Proceedings of the 6th International Conference (ProvSec 2012), P53, DOI 10.1007/978-3-642-33272-2_5
[4]  
Debnath Somen, 2019, Advances in Computer, Communication and Control. Proceedings of ETES 2018. Lecture Notes in Networks and Systems (LNNS 41), P113, DOI 10.1007/978-981-13-3122-0_12
[5]   Efficient and scalable outsourced data access control with user revocation in cloud: A comprehensive study [J].
Debnath, S. ;
Bhuyan, B. .
MULTIAGENT AND GRID SYSTEMS, 2018, 14 (04) :383-401
[6]   Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing [J].
Debnath, Somen ;
Bhuyan, Bubu .
MULTIAGENT AND GRID SYSTEMS, 2019, 15 (02) :99-119
[7]   Ciphertext-Policy Attribute-Based Signcryption with Verifiable Outsourced Designcryption for Sharing Personal Health Records [J].
Deng, Fuhu ;
Wang, Yali ;
Peng, Li ;
Xiong, Hu ;
Geng, Ji ;
Qin, Zhiguang .
IEEE ACCESS, 2018, 6 :39473-39486
[8]  
Dong YJ, 2011, PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND APPLICATION, ICCTA2011, P905, DOI 10.1049/cp.2011.0801
[9]  
Emura Keita, 2012, International Journal of Applied Cryptography, V2, P199, DOI 10.1504/IJACT.2012.045589
[10]  
Gagné M, 2010, LECT NOTES COMPUT SC, V6280, P154, DOI 10.1007/978-3-642-15317-4_11