Skip to main content
Erschienen in: Wireless Networks 2/2021

20.11.2020

Equality test with an anonymous authorization in cloud computing

verfasst von: Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Mohammed Ramadan, Zhiguang Qin

Erschienen in: Wireless Networks | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rapid popularity and wide adoption of cloud storage, providing privacy-preserving by protecting sensitive information becomes a matter of grave concern. The most effective and sensible way to address this issue is to encrypt the data before uploading it to the cloud. However, to search over encrypted data with different keys is still an open problem when it comes to the deployment of emerging technologies such as healthcare applications and e-marketplace systems. To address these issues, in this paper, we proposed a secure and efficient public-key encryption with an equality test technique that supports anonymous authorization, abbreviated as (PKEET-AA). Our proposed scheme allows a specific user to identify who can perform the equality test process among various cloud servers without compromising sensitive information. It also provides an anonymous approach to search for some statistical information about specific identical encrypted records in several databases. Moreover, we prove that our proposed PKEET-AA scheme is one-way secure against chosen-ciphertext attack (OW-CCA) and undistinguishable against adaptive chosen ciphertext attack (IND-CCA) in the random oracle model. Thus, to provide authorization/multi-authorization anonymity under the Decisional Diffie–Hellman assumption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Whitfield, D., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.MathSciNetCrossRef Whitfield, D., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.MathSciNetCrossRef
2.
Zurück zum Zitat Dan, B., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522). Berlin, Heidelberg: Springer. Dan, B., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522). Berlin, Heidelberg: Springer.
3.
Zurück zum Zitat Yang, G., Tan, C. H., Huang, Q., & Wong, D. S. (2010). Probabilistic public key encryption with equality test. CT-RSA, CA, USA, March 1 (pp. 119–131). Springer. Yang, G., Tan, C. H., Huang, Q., & Wong, D. S. (2010). Probabilistic public key encryption with equality test. CT-RSA, CA, USA, March 1 (pp. 119–131). Springer.
4.
Zurück zum Zitat Tang, Q. (2012). Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2(4), 304–321.MathSciNetCrossRef Tang, Q. (2012). Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2(4), 304–321.MathSciNetCrossRef
5.
Zurück zum Zitat Mohammed, R., Yongjian, L., Fagen, L., Shijie, Z., & Hisham, A. (2019). IBEETRSA: Identity-based encryption with equality test over RSA for wireless body area network. Mobile Networks and Applications, 25, 223–233. Mohammed, R., Yongjian, L., Fagen, L., Shijie, Z., & Hisham, A. (2019). IBEETRSA: Identity-based encryption with equality test over RSA for wireless body area network. Mobile Networks and Applications, 25, 223–233.
7.
Zurück zum Zitat Yan, X., Wang, M., Zhong, H., Cui, J., Liu, L., & Franqueira, V. N. L. (2017). Verifiable public key encryption scheme with equality test in 5G networks. IEEE Access, 5, 12702–12713.CrossRef Yan, X., Wang, M., Zhong, H., Cui, J., Liu, L., & Franqueira, V. N. L. (2017). Verifiable public key encryption scheme with equality test in 5G networks. IEEE Access, 5, 12702–12713.CrossRef
8.
Zurück zum Zitat Tang, Q. (2011). Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Proceedings of 16th Australasian conference information security and privacy. Melbourne, Australia (Vol. 6812, pp. 389–406). Tang, Q. (2011). Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Proceedings of 16th Australasian conference information security and privacy. Melbourne, Australia (Vol. 6812, pp. 389–406).
9.
Zurück zum Zitat Tang, Q. (2012). Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5(12), 1351–1362.CrossRef Tang, Q. (2012). Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5(12), 1351–1362.CrossRef
11.
Zurück zum Zitat Wu, L., Zhang, Y., Choo, K. K. R., & He, D. (2017). Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generation Computer Systems, 73, 22–31.CrossRef Wu, L., Zhang, Y., Choo, K. K. R., & He, D. (2017). Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generation Computer Systems, 73, 22–31.CrossRef
12.
Zurück zum Zitat Ma, S., Huang, Q., Zhang, M., & Yang, B. (2015). Efficient public key encryption with equality test supporting flexible authorization. IEEE Transactions on Information Forensics and Security, 10, 458–470.CrossRef Ma, S., Huang, Q., Zhang, M., & Yang, B. (2015). Efficient public key encryption with equality test supporting flexible authorization. IEEE Transactions on Information Forensics and Security, 10, 458–470.CrossRef
13.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptology, CRYPTO 2001 (pp. 213–229). Springer. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptology, CRYPTO 2001 (pp. 213–229). Springer.
14.
Zurück zum Zitat Andrew, Y. C. (1982). Protocols for secure computations. In 23rd annual symposium on foundations of computer science (sfcs 1982) (pp. 160–164). IEEE. Andrew, Y. C. (1982). Protocols for secure computations. In 23rd annual symposium on foundations of computer science (sfcs 1982) (pp. 160–164). IEEE.
15.
Zurück zum Zitat Du, M., Wang, K., Chen, Y., Wang, X., & Sun, Y. (2018). Big data privacy preserving in multi-access edge computing for heterogeneous Internet of Things. IEEE Communications Magazine, 56(8), 62–67.CrossRef Du, M., Wang, K., Chen, Y., Wang, X., & Sun, Y. (2018). Big data privacy preserving in multi-access edge computing for heterogeneous Internet of Things. IEEE Communications Magazine, 56(8), 62–67.CrossRef
17.
Zurück zum Zitat Ramesh, S., & Bhaskaran, V. M. (2014). An improved remote user authentication scheme with elliptic curve cryptography and smart card without using bilinear pairings. International Journal of Engineering and Technology (IJET), 5(6), 5140–5154. Ramesh, S., & Bhaskaran, V. M. (2014). An improved remote user authentication scheme with elliptic curve cryptography and smart card without using bilinear pairings. International Journal of Engineering and Technology (IJET), 5(6), 5140–5154.
18.
Zurück zum Zitat Wang, D., He, D., Wang, P., & Chu, C. H. (2014). Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing, PP(99), 1–15. Wang, D., He, D., Wang, P., & Chu, C. H. (2014). Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing, PP(99), 1–15.
19.
Zurück zum Zitat Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.CrossRef Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.CrossRef
20.
Zurück zum Zitat Kouichi, S., & Shizuya, H. (1995). Relationships among the computational powers of breaking discrete log cryptosystems. In Advances in cryptology EUROCRYPT’95 (pp. 341–355). Berlin/Heidelberg: Springer. Kouichi, S., & Shizuya, H. (1995). Relationships among the computational powers of breaking discrete log cryptosystems. In Advances in cryptology EUROCRYPT’95 (pp. 341–355). Berlin/Heidelberg: Springer.
21.
Zurück zum Zitat Ming, Y., & Erxiu, W. (2019). Identity-based encryption with filtered equality test for smart city applications. Sensors, 19(14), 3046.CrossRef Ming, Y., & Erxiu, W. (2019). Identity-based encryption with filtered equality test for smart city applications. Sensors, 19(14), 3046.CrossRef
22.
Zurück zum Zitat He, D., & Chen, J. (2013). An efficient certificate-less designated verifier signature scheme. The International Arab Journal of Information Technology, 10(4), 389–396. He, D., & Chen, J. (2013). An efficient certificate-less designated verifier signature scheme. The International Arab Journal of Information Technology, 10(4), 389–396.
23.
Zurück zum Zitat Hea, D., Chen, J., & Zhang, R. (2011). An efficient identity-based blind signature scheme without bilinear pairings. Computers & Electrical Engineering, 37(4), 444–450.CrossRef Hea, D., Chen, J., & Zhang, R. (2011). An efficient identity-based blind signature scheme without bilinear pairings. Computers & Electrical Engineering, 37(4), 444–450.CrossRef
24.
Zurück zum Zitat Rivest, R., Adleman, L., & Dertouzos, M. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation, 4, 169–179.MathSciNet Rivest, R., Adleman, L., & Dertouzos, M. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation, 4, 169–179.MathSciNet
25.
Zurück zum Zitat Tushar, S., & Takeshi, K. (2018). Outsourcing private equality tests to the cloud. Journal of Information Security and Applications, 43, 83–98.CrossRef Tushar, S., & Takeshi, K. (2018). Outsourcing private equality tests to the cloud. Journal of Information Security and Applications, 43, 83–98.CrossRef
Metadaten
Titel
Equality test with an anonymous authorization in cloud computing
verfasst von
Hisham Abdalla
Hu Xiong
Abubaker Wahaballa
Mohammed Ramadan
Zhiguang Qin
Publikationsdatum
20.11.2020
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2021
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02462-5

Weitere Artikel der Ausgabe 2/2021

Wireless Networks 2/2021 Zur Ausgabe