Skip to main content
Top
Published in: Telecommunication Systems 4/2019

21-11-2018

A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid

Authors: Emmanuel Ahene, Junfeng Dai, Hao Feng, Fagen Li

Published in: Telecommunication Systems | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing has proven to be applicable in smart grid systems with the help of the cloud-based Internet of things (IoT) technology. In this concept, IoT is deployed as a front-end enabling the acquisition of smart grid-related data and its outsourcing to the cloud for data storage purposes. It is obvious that data storage is a pertinent service in cloud computing. However, its wide adoption is hindered by the concern of having a secure access to data without a breach on confidentiality and authentication. To address this problem, we propose a novel data access control scheme that simultaneously accomplishes confidentiality and authentication for cloud-based smart grid systems. Our scheme can enable the storing of encrypted smart grid-related data in the cloud. When a user prefers to access the data, the data owner issues a delegation command to the cloud for data re-encryption. The cloud is unable to acquire any plaintext information on the data. Only authorized users are capable of decrypting the data. Moreover, the integrity and authentication of data can only be verified by the authorized user. We obtain the data access control scheme by proposing a pairing free certificateless signcryption with proxy re-encryption (CLS-PRE) scheme. We prove that our CLS-PRE scheme has indistinguishability against adaptive chosen ciphertext attack under the gap Diffie–Hellman problem and existential unforgeability against adaptive chosen message attack under elliptic curve discrete logarithm problem in the random oracle model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Singh, J., Pasquier, T., Bacon, J., Ko, H., & Eyers, D. (2016). Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of Things Journal, 3(3), 269–284.CrossRef Singh, J., Pasquier, T., Bacon, J., Ko, H., & Eyers, D. (2016). Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of Things Journal, 3(3), 269–284.CrossRef
2.
go back to reference Xu, S., Qian, Y., & Hu, R. Q. (2015). On reliability of smart grid neighborhood area networks. IEEE Access, 3(1), 2352–2365.CrossRef Xu, S., Qian, Y., & Hu, R. Q. (2015). On reliability of smart grid neighborhood area networks. IEEE Access, 3(1), 2352–2365.CrossRef
3.
go back to reference Xiao, J., Zu, G., Gong, X., & Li, F. (2017). Observation of security region boundary for smart distribution grid. IEEE Transactions on Smart Grid, 8(4), 1731–1738.CrossRef Xiao, J., Zu, G., Gong, X., & Li, F. (2017). Observation of security region boundary for smart distribution grid. IEEE Transactions on Smart Grid, 8(4), 1731–1738.CrossRef
4.
go back to reference Jiang, L., Xu, L. D., Cai, H., Jiang, Z., Bu, F., & Xu, B. (2014). An IoT-oriented data storage framework in cloud computing platform. IEEE Transactions on Industrial Informatics, 10(2), 1443–1451.CrossRef Jiang, L., Xu, L. D., Cai, H., Jiang, Z., Bu, F., & Xu, B. (2014). An IoT-oriented data storage framework in cloud computing platform. IEEE Transactions on Industrial Informatics, 10(2), 1443–1451.CrossRef
5.
go back to reference Morello, R., De Capua, C., Fulco, G., & Mukhopadhyay, S. C. (2017). A smart power meter to monitor energy flow in smart grids: The role of advanced sensing and IoT in the electric grid of the future. IEEE Sensors Journal, 17(23), 7828–7837.CrossRef Morello, R., De Capua, C., Fulco, G., & Mukhopadhyay, S. C. (2017). A smart power meter to monitor energy flow in smart grids: The role of advanced sensing and IoT in the electric grid of the future. IEEE Sensors Journal, 17(23), 7828–7837.CrossRef
6.
go back to reference Li, Y., Cheng, X., Cao, Y., Wang, D., & Yang, L. (2018). Smart choice for the smart grid: Narrowband Internet of Things (NB-IoT). IEEE Internet of Things Journal, 5(3), 1505–1515.CrossRef Li, Y., Cheng, X., Cao, Y., Wang, D., & Yang, L. (2018). Smart choice for the smart grid: Narrowband Internet of Things (NB-IoT). IEEE Internet of Things Journal, 5(3), 1505–1515.CrossRef
7.
go back to reference Tian, X., Wang, X., & Zhou, A. (2009). DSP re-encryption: a flexible mechanism for access control enforcement management in DaaS. In Proceeding of CLOUD (pp. 25–32). Bangalore: IEEE. Tian, X., Wang, X., & Zhou, A. (2009). DSP re-encryption: a flexible mechanism for access control enforcement management in DaaS. In Proceeding of CLOUD (pp. 25–32). Bangalore: IEEE.
8.
go back to reference Liu, Q., Tan, C. C., Wu, J., & Wang, G. (2011) Reliable re-encryption in unreliable clouds. In Proceedings of GLOBECOM (pp. 1–5). Houston: IEEE. Liu, Q., Tan, C. C., Wu, J., & Wang, G. (2011) Reliable re-encryption in unreliable clouds. In Proceedings of GLOBECOM (pp. 1–5). Houston: IEEE.
9.
go back to reference Park, N. (2011). Secure data access control scheme using type-based re-encryption in cloud environment. In Proceedings of semantic methods for knowledge management and communication, SCI (Vol. 381, pp. 319–327). Springer. Park, N. (2011). Secure data access control scheme using type-based re-encryption in cloud environment. In Proceedings of semantic methods for knowledge management and communication, SCI (Vol. 381, pp. 319–327). Springer.
10.
go back to reference Khan, A. N., Kiah, M. L. M., Madani, S. A., Ali, M., Khan, A. U. R., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651.CrossRef Khan, A. N., Kiah, M. L. M., Madani, S. A., Ali, M., Khan, A. U. R., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651.CrossRef
11.
go back to reference Li, F., Liu, B., & Hong, J. (2017). An efficient signcryption for data access control in cloud computing. Computing, 99(5), 465–479.CrossRef Li, F., Liu, B., & Hong, J. (2017). An efficient signcryption for data access control in cloud computing. Computing, 99(5), 465–479.CrossRef
12.
go back to reference Le, X. H., Lee, S., Butun, I., Khalid, M., Sankar, R., Kim, M., et al. (2009). An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Journal of Communications and Networks, 11(6), 599–606.CrossRef Le, X. H., Lee, S., Butun, I., Khalid, M., Sankar, R., Kim, M., et al. (2009). An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Journal of Communications and Networks, 11(6), 599–606.CrossRef
14.
go back to reference Wang, C., & Cao, X. (2011). An improved signcryption with proxy re-encryption and its application. In Proceedings of CIS 2011 (pp. 886–890). Hainan: IEEE. Wang, C., & Cao, X. (2011). An improved signcryption with proxy re-encryption and its application. In Proceedings of CIS 2011 (pp. 886–890). Hainan: IEEE.
15.
go back to reference Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In ACM symposium on information, computer and communications security-ASIACCS 2008 (pp. 369–372). Japan: Tokyo. Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In ACM symposium on information, computer and communications security-ASIACCS 2008 (pp. 369–372). Japan: Tokyo.
16.
go back to reference Anyembe, A. O., Niyifasha, R., & Li, F. (2016). A provably-secure transmission scheme for wireless body area networks. Journal of Medical Systems, 40(11), 247–261.CrossRef Anyembe, A. O., Niyifasha, R., & Li, F. (2016). A provably-secure transmission scheme for wireless body area networks. Journal of Medical Systems, 40(11), 247–261.CrossRef
17.
go back to reference Chen, L., & Malone-Lee, J. (2005). Improved identity-based signcryption. In 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland (pp. 362–379). Springer. Chen, L., & Malone-Lee, J. (2005). Improved identity-based signcryption. In 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland (pp. 362–379). Springer.
18.
go back to reference Wu, C., & Chen, Z. X. (2008). A new efficient certificateless signcryption scheme. In Proceedings of IEEE international symposium on information science and engineering, ISISE 2008 (Vol. 1, pp. 661–664). Shanghai: IEEE. Wu, C., & Chen, Z. X. (2008). A new efficient certificateless signcryption scheme. In Proceedings of IEEE international symposium on information science and engineering, ISISE 2008 (Vol. 1, pp. 661–664). Shanghai: IEEE.
19.
go back to reference Xie, W., & Zhang, Z. (2010). Efficient and provably secure certificateless signcryption from bilinear maps. In Proceedings of IEEE international conference on wireless communications, networking and information security, WCNIS 2010 (pp. 558–562). Beijing: IEEE. Xie, W., & Zhang, Z. (2010). Efficient and provably secure certificateless signcryption from bilinear maps. In Proceedings of IEEE international conference on wireless communications, networking and information security, WCNIS 2010 (pp. 558–562). Beijing: IEEE.
20.
go back to reference Aranha, D., Castro, R., & Lopez, J. (2008). Efficient certificateless signcryption. In Brazilian symposium on information and computer systems security (pp. 257–258). Brazil. Aranha, D., Castro, R., & Lopez, J. (2008). Efficient certificateless signcryption. In Brazilian symposium on information and computer systems security (pp. 257–258). Brazil.
21.
go back to reference Canetti, R., Goldreich, O., & Halevi, S. (1998). The random oracle methodology, revisited. In Proceedings of the 30th annual ACM symposium on the theory of computing STOC (pp. 209–218). ACM. Canetti, R., Goldreich, O., & Halevi, S. (1998). The random oracle methodology, revisited. In Proceedings of the 30th annual ACM symposium on the theory of computing STOC (pp. 209–218). ACM.
22.
go back to reference Liu, Z., Hu, Y., Zhang, X., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.CrossRef Liu, Z., Hu, Y., Zhang, X., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.CrossRef
23.
go back to reference Weng, J., Yao, G., Deng, R. H., Chen, M. R., & Li, X. (2011). Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 181(3), 661–667.CrossRef Weng, J., Yao, G., Deng, R. H., Chen, M. R., & Li, X. (2011). Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 181(3), 661–667.CrossRef
24.
go back to reference Miao, S., Zhang, F., Li, S., & Mu, Y. (2013). On security of a certificateless signcryption scheme. Information Sciences, 232(20), 475–481.CrossRef Miao, S., Zhang, F., Li, S., & Mu, Y. (2013). On security of a certificateless signcryption scheme. Information Sciences, 232(20), 475–481.CrossRef
26.
go back to reference Xiong, H. (2014). Toward certificateless signcryption scheme without random oracles. IACR Cryptology ePrint Archive, 162(1), 1–13. Xiong, H. (2014). Toward certificateless signcryption scheme without random oracles. IACR Cryptology ePrint Archive, 162(1), 1–13.
27.
go back to reference Mambo, M., & Okamoto, E. (1997). Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E80–A(1), 54–63. Mambo, M., & Okamoto, E. (1997). Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E80–A(1), 54–63.
28.
go back to reference Green, M., & Ateniese, G. (2007). Identity-based proxy re-encryption. In Proceedings of ACNS 2007, LNCS (Vol. 4521, pp. 288–306). Springer. Green, M., & Ateniese, G. (2007). Identity-based proxy re-encryption. In Proceedings of ACNS 2007, LNCS (Vol. 4521, pp. 288–306). Springer.
29.
go back to reference Shao, J., & Cao, Z. (2012). Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Information Sciences, 206(1), 83–95.CrossRef Shao, J., & Cao, Z. (2012). Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Information Sciences, 206(1), 83–95.CrossRef
30.
go back to reference Liang, K., Liu, J. K., Wong, D. S., & Susilo, W. (2014). An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In Proceedigs of ESORICS 2014, LNCS (Vol. 8712, pp. 257–272). Springer. Liang, K., Liu, J. K., Wong, D. S., & Susilo, W. (2014). An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In Proceedigs of ESORICS 2014, LNCS (Vol. 8712, pp. 257–272). Springer.
31.
go back to reference Kirtane, V., & Rangan, C. P. (2008). RSA-TBOS signcryption with proxy re-encryption. In Proceedings of DRM08 (pp. 59–66). New York: ACM. Kirtane, V., & Rangan, C. P. (2008). RSA-TBOS signcryption with proxy re-encryption. In Proceedings of DRM08 (pp. 59–66). New York: ACM.
32.
go back to reference Malone-Lee, J., & Mao, W. (2003). Two birds one stone: signcryption using RSA. In Proceedings of CT-RSA 2003, LNCS (Vol. 2612, pp. 211–226). Malone-Lee, J., & Mao, W. (2003). Two birds one stone: signcryption using RSA. In Proceedings of CT-RSA 2003, LNCS (Vol. 2612, pp. 211–226).
34.
go back to reference Wang, H., Wang, C., & Cao, H. (2011). ID-based proxy re-signcryption scheme. In Proceedings of CSAE 2011 (pp. 317–321). Shanghai: IEEE. Wang, H., Wang, C., & Cao, H. (2011). ID-based proxy re-signcryption scheme. In Proceedings of CSAE 2011 (pp. 317–321). Shanghai: IEEE.
35.
go back to reference Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of INFOCOM 2010 (pp. 534–542). Seattle: IEEE Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of INFOCOM 2010 (pp. 534–542). Seattle: IEEE
36.
go back to reference Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. Transactions on Parallel and Distributed Systems, 24(1), 131–143.CrossRef Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. Transactions on Parallel and Distributed Systems, 24(1), 131–143.CrossRef
37.
go back to reference Nabeel, M., Shang, N., & Bertino, E. (2013). Privacy preserving policy-based content sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 25(11), 2602–2614.CrossRef Nabeel, M., Shang, N., & Bertino, E. (2013). Privacy preserving policy-based content sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 25(11), 2602–2614.CrossRef
38.
go back to reference Yang, K., & Jia, X. (2014). Expressive, efficient, and revocable data access control for multiauthority cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25(7), 1735–1744.CrossRef Yang, K., & Jia, X. (2014). Expressive, efficient, and revocable data access control for multiauthority cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25(7), 1735–1744.CrossRef
39.
go back to reference Hur, J. (2013). Improving security and efficiency in attribute-based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271–2282.CrossRef Hur, J. (2013). Improving security and efficiency in attribute-based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271–2282.CrossRef
40.
go back to reference Lai, J., Deng, R. H., Guan, C., & Weng, J. (2013). Attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 8(8), 1343–1354.CrossRef Lai, J., Deng, R. H., Guan, C., & Weng, J. (2013). Attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 8(8), 1343–1354.CrossRef
41.
go back to reference Li, J., Huang, X., Li, J., Chen, X., & Xiang, Y. (2014). Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems, 25(8), 2201–2210.CrossRef Li, J., Huang, X., Li, J., Chen, X., & Xiang, Y. (2014). Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems, 25(8), 2201–2210.CrossRef
42.
go back to reference Boyen, X. (2003). Multipurpose identity-based signcryption. A Swiss army knife for identity-based cryptography. In Proceedings of CRYPTO 2003, LNCS (Vol. 2729, pp. 383–399). Springer. Boyen, X. (2003). Multipurpose identity-based signcryption. A Swiss army knife for identity-based cryptography. In Proceedings of CRYPTO 2003, LNCS (Vol. 2729, pp. 383–399). Springer.
43.
go back to reference Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRef Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRef
45.
go back to reference Shim, K. (2012). CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. Trans Vehicular Technology, 61(4), 1874–1883.CrossRef Shim, K. (2012). CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. Trans Vehicular Technology, 61(4), 1874–1883.CrossRef
46.
go back to reference Shabisha, P., Braeken, A., Touhafi, A., & Steenhaut, K. (2019). Elliptic curve Qu-Vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage. In CloudTech 2017, Lecture notes in networks and systems (Vol. 49, pp. 1–18). Springer. Shabisha, P., Braeken, A., Touhafi, A., & Steenhaut, K. (2019). Elliptic curve Qu-Vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage. In CloudTech 2017, Lecture notes in networks and systems (Vol. 49, pp. 1–18). Springer.
Metadata
Title
A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid
Authors
Emmanuel Ahene
Junfeng Dai
Hao Feng
Fagen Li
Publication date
21-11-2018
Publisher
Springer US
Published in
Telecommunication Systems / Issue 4/2019
Print ISSN: 1018-4864
Electronic ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-018-0530-5

Other articles of this Issue 4/2019

Telecommunication Systems 4/2019 Go to the issue