An efficient signcryption for data access control in cloud computing

被引:27
作者
Li, Fagen [1 ]
Liu, Bo [1 ]
Hong, Jiaojiao [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Ctr Cyber Secur, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金; 国家教育部博士点专项基金资助;
关键词
Cloud computing; Security; Access control; Signcryption; Identity-based cryptosystem; STORAGE; SCHEME;
D O I
10.1007/s00607-017-0548-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data storage is one of main services in cloud computing. How to ensure the confidentiality and authorized access of data is the central issue of data storage. In this paper, we propose a novel data access control scheme that can simultaneously achieve confidentiality and authentication for cloud computing. In this scheme, users store encrypted data in the cloud. When a user wants to access the data, the data owner delegates the cloud to re-encrypt the data and only the authorized user can decrypt the data. The cloud can not get any plaintext information about the data. In addition, the authorized user can verify the integrity and authentication of the data. We realize the data access control scheme by proposing an identity-based signcryption (IBSC) scheme with proxy re-encryption. We prove that the IBSC scheme has the indistinguishability against adaptive chosen ciphertext attack under the decisional bilinear Diffie-Hellman problem and existential unforgeability against adaptive chosen message attack under the computational Diffie-Hellman problem in the random oracle model.
引用
收藏
页码:465 / 479
页数:15
相关论文
共 29 条
[1]  
[Anonymous], 2008276 CRYPT EPRINT
[2]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[3]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[4]  
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[5]  
Caifen Wang, 2011, Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security (CIS 2011), P886, DOI 10.1109/CIS.2011.200
[6]  
Chen LQ, 2005, LECT NOTES COMPUT SC, V3386, P362
[7]  
Daemen J., 2002, DESIGN RIJNDAEL AES, DOI DOI 10.1007/978-3-662-04722-4
[8]  
Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
[9]   Identity-Based Secure Distributed Data Storage Schemes [J].
Han, Jinguang ;
Susilo, Willy ;
Mu, Yi .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) :941-953
[10]   Improving Security and Efficiency in Attribute-Based Data Sharing [J].
Hur, Junbeom .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (10) :2271-2282