Skip to main content
Erschienen in: Automated Software Engineering 1/2022

01.05.2022

\(l-\)PEES-IMP: lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment

verfasst von: Sunitha Pachala, Ch. Rupa, L. Sumalatha

Erschienen in: Automated Software Engineering | Ausgabe 1/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The user authenticity with proper identification is a significant challenge where the defects on the authenticity scheme can directly influence the sensitive data over the multi-cloud data (environment). It leads to severe information breaches and data loss over the cloud environment. Thus, a cloud user identity management protocol has to be designed in a secured manner using the proxy-encryption scheme, i.e., proxy transmits a cipher to another with a different encryption key by preserving the plain text secrets. Therefore, the intervention of third-party is avoided efficiently. This research provides an identity management protocol based on a proxy re-encryption scheme, an improved version of the existing identity management protocol, and named Lightweight Proxy re-encryption-based identity management protocol (\(l-\) PEES-IMP). It resolves the computational overhead that occurs during the encryption operation performed by the data owners and decryption due to asymmetric mode. It integrates symmetric and asymmetric encryption to establish secure communication. It is applied over the multi-cloud environment to develop privacy and security among sensitive data to avoid data loss or data breaching. It is also a trustworthy identity protocol for service providers and users. It addresses the problem related to the reliance on a third party, commonly identified in existing identity management protocol. Finally, the evaluation of the proposed PEES-IMP is done with existing ECC, RSA, hybrid model and EIDM, and various metrics to guarantee privacy and security of the data. The simulation is performed using MATLAB environment and shows better outcomes compared to prevailing approaches. This model is flexible which can be adopted practically. The encryption time of \(l-\) PEES-IMP is 0.819 ms, decryption time is 3.872 ms and re-encryption time is 28.18 ms which is better compared to other approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ateniese, K., Fu, M.G., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Sec. (TISSEC) 9(1), 1–30 (2006)CrossRef Ateniese, K., Fu, M.G., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Sec. (TISSEC) 9(1), 1–30 (2006)CrossRef
Zurück zum Zitat Bertino, et al.: Privacy-preserving digital identity management for cloud computing. Bullet. IEEE Comput. Soc. Tech. Committ. Data Eng. 32(1), 21–27 (2009)MathSciNet Bertino, et al.: Privacy-preserving digital identity management for cloud computing. Bullet. IEEE Comput. Soc. Tech. Committ. Data Eng. 32(1), 21–27 (2009)MathSciNet
Zurück zum Zitat Chandran, M. Chase, F. Liu, R. Nishimaki, and K. Kagawa, “Reencryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices,” vol. 8383, pp. 95–112, (2014). Chandran, M. Chase, F. Liu, R. Nishimaki, and K. Kagawa, “Reencryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices,” vol. 8383, pp. 95–112, (2014).
Zurück zum Zitat Chow, J. Weng, Y. Yang, and R. H. Deng, “Efficient unidirectionalunidirectional proxy re-encryption,” in International Conference on Cryptology in Africa. Springer, (2010), pp. 316–332 Chow, J. Weng, Y. Yang, and R. H. Deng, “Efficient unidirectionalunidirectional proxy re-encryption,” in International Conference on Cryptology in Africa. Springer, (2010), pp. 316–332
Zurück zum Zitat Chu and W.-G. Tzeng, “Identity-based proxy re-encryption without random oracles,” in International Conference on Information Security. Springer, (2007), pp. 189–202. Chu and W.-G. Tzeng, “Identity-based proxy re-encryption without random oracles,” in International Conference on Information Security. Springer, (2007), pp. 189–202.
Zurück zum Zitat Dey, Weis, S., “PseudoID: Enhancing privacy in federated login,” in Hot Topics in Privacy Enhancing Technologies, (2010), pp. 95–107. Dey, Weis, S., “PseudoID: Enhancing privacy in federated login,” in Hot Topics in Privacy Enhancing Technologies, (2010), pp. 95–107.
Zurück zum Zitat Egorov and Wilkison M., “Nucypher kms: Decentralized key management system.” arXiv: Cryptography and Security, (2017) Egorov and Wilkison M., “Nucypher kms: Decentralized key management system.” arXiv: Cryptography and Security, (2017)
Zurück zum Zitat Fan and Liu F., “Proxy re-encryption and re-signatures from lattices,” pp. 363–382, (2019). Fan and Liu F., “Proxy re-encryption and re-signatures from lattices,” pp. 363–382, (2019).
Zurück zum Zitat Fan X., Liu, F. “Proxy re-encryption and re-signatures from lattices,” pp. 363–382, (2019). Fan X., Liu, F. “Proxy re-encryption and re-signatures from lattices,” pp. 363–382, (2019).
Zurück zum Zitat Hanna, ``Systems and methods for an incremental, reversible and decentralized biometric identity management system,'' U.S. Patent 10 078 758 B1, Sep. 18, (2018). Hanna, ``Systems and methods for an incremental, reversible and decentralized biometric identity management system,'' U.S. Patent 10 078 758 B1, Sep. 18, (2018).
Zurück zum Zitat He GE, “An Anonymous Authentication Scheme for Identification Card “, Int. Conf on information and communication security, pp. 238–248, (2006). He GE, “An Anonymous Authentication Scheme for Identification Card “, Int. Conf on information and communication security, pp. 238–248, (2006).
Zurück zum Zitat Khalil, A.K., Azeem, M.: Consolidated identity management system for secure mobile cloud computing. Comput. Netw. 65(2), 99–110 (2014)CrossRef Khalil, A.K., Azeem, M.: Consolidated identity management system for secure mobile cloud computing. Comput. Netw. 65(2), 99–110 (2014)CrossRef
Zurück zum Zitat Kim, S., Lee, I.: IoT device security based on proxy re-encryption. J. Ambient Intell. Human. Comput. 9(4), 1267–1273 (2018)MathSciNetCrossRef Kim, S., Lee, I.: IoT device security based on proxy re-encryption. J. Ambient Intell. Human. Comput. 9(4), 1267–1273 (2018)MathSciNetCrossRef
Zurück zum Zitat Maitra, S., Yelamarthi, K.: Rapidly deployable IoT architecture with data security: implementation and experimental evaluation. Sensors 19(11), 2484 (2019)CrossRef Maitra, S., Yelamarthi, K.: Rapidly deployable IoT architecture with data security: implementation and experimental evaluation. Sensors 19(11), 2484 (2019)CrossRef
Zurück zum Zitat Miao, J., Ma, X., Liu, J., Weng, H.L., Li, H.: Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans. Services Comput. 12(5), 772–785 (2019)CrossRef Miao, J., Ma, X., Liu, J., Weng, H.L., Li, H.: Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans. Services Comput. 12(5), 772–785 (2019)CrossRef
Zurück zum Zitat Mohd, B. J., & Hayajneh, T. (2018). Lightweight block ciphers for IoT: energy optimization and survivability techniques. IEEE Access, 6, 35966-35978. Mohd, B. J., & Hayajneh, T. (2018). Lightweight block ciphers for IoT: energy optimization and survivability techniques. IEEE Access, 6, 35966-35978.
Zurück zum Zitat Phong, L. Wang, Y. Aono, M. H. Nguyen, and X. Boyen, “Proxy re-encryption schemes with key privacy from lwe.” IACR Cryptology ePrint Archive, vol. 2016, p. 327, (2016). Phong, L. Wang, Y. Aono, M. H. Nguyen, and X. Boyen, “Proxy re-encryption schemes with key privacy from lwe.” IACR Cryptology ePrint Archive, vol. 2016, p. 327, (2016).
Zurück zum Zitat Poomagal, C.T., Kumar, G.S.: ECC based lightweight secure message conveyance protocol for satellite communication in internet of vehicles (IoV). Wirel. Person. Commun. 113(2), 1359–1377 (2020)CrossRef Poomagal, C.T., Kumar, G.S.: ECC based lightweight secure message conveyance protocol for satellite communication in internet of vehicles (IoV). Wirel. Person. Commun. 113(2), 1359–1377 (2020)CrossRef
Zurück zum Zitat Salim, T.N., Sakurai, K., “Realizing proxy re-encryption in the symmetric world,” in International Conference on Informatics Engineering and Information Science. Springer, (2011), pp. 259–274. Salim, T.N., Sakurai, K., “Realizing proxy re-encryption in the symmetric world,” in International Conference on Informatics Engineering and Information Science. Springer, (2011), pp. 259–274.
Zurück zum Zitat Shaikh. R., Sasikumar.M.: ``Identity management in cloud computing,'' Int. J. Comput. Appl., vol. 63, no. 11, (2013). Shaikh. R., Sasikumar.M.: ``Identity management in cloud computing,'' Int. J. Comput. Appl., vol. 63, no. 11, (2013).
Zurück zum Zitat Shao, Wei G., Ling, Y., and Xie, M., “Identity-based conditional proxy re-encryption,” in 2011 IEEE International Conference on Communications (ICC). IEEE, (2011), pp. 1–5. Shao, Wei G., Ling, Y., and Xie, M., “Identity-based conditional proxy re-encryption,” in 2011 IEEE International Conference on Communications (ICC). IEEE, (2011), pp. 1–5.
Zurück zum Zitat Shi, R.X., Fu, A.M.: Multi-element based on proxy re-encryption scheme for mobile cloud computing. J. Commun. 36(11), 73–79 (2015) Shi, R.X., Fu, A.M.: Multi-element based on proxy re-encryption scheme for mobile cloud computing. J. Commun. 36(11), 73–79 (2015)
Zurück zum Zitat Sun, M., Ge, C., Fang, L., Wang, J.: A proxy broadcast re-encryption for cloud data sharing. Multim. Tools Appl. 77(9), 455–469 (2018)CrossRef Sun, M., Ge, C., Fang, L., Wang, J.: A proxy broadcast re-encryption for cloud data sharing. Multim. Tools Appl. 77(9), 455–469 (2018)CrossRef
Zurück zum Zitat Sun, C., Ge, L.F., Wang, J.: A proxy broadcast re-encryption for cloud data sharing. Multim. Tools Appl. 77(9), 10455–10469 (2018)CrossRef Sun, C., Ge, L.F., Wang, J.: A proxy broadcast re-encryption for cloud data sharing. Multim. Tools Appl. 77(9), 10455–10469 (2018)CrossRef
Zurück zum Zitat Weng, M., Chen, Y., Yang, R., Deng, K.C., Bao, F.: CCA secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. Chin. Inf. Sci. 53(3), 593–606 (2010)MathSciNetCrossRef Weng, M., Chen, Y., Yang, R., Deng, K.C., Bao, F.: CCA secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. Chin. Inf. Sci. 53(3), 593–606 (2010)MathSciNetCrossRef
Zurück zum Zitat Xu, P., Jiao, T., Wu, Q., Wang, W., Jin, H.: Conditional identity-based broadcast proxy re-encryption and its application to cloud email. IEEE Trans. Comput. 65(1), 66–79 (2016)MathSciNetCrossRef Xu, P., Jiao, T., Wu, Q., Wang, W., Jin, H.: Conditional identity-based broadcast proxy re-encryption and its application to cloud email. IEEE Trans. Comput. 65(1), 66–79 (2016)MathSciNetCrossRef
Zurück zum Zitat Yao, W., Zhang, Y., Qian, H., Han, J.: Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans. Serv. Comput. 10(5), 785–796 (2017)CrossRef Yao, W., Zhang, Y., Qian, H., Han, J.: Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans. Serv. Comput. 10(5), 785–796 (2017)CrossRef
Zurück zum Zitat Yu, R., Chen, H., Li, Y.L., Tian, A.: Toward data security in edge intelligent IIoT. IEEE Netw. 33(5), 20–26 (2019)CrossRef Yu, R., Chen, H., Li, Y.L., Tian, A.: Toward data security in edge intelligent IIoT. IEEE Netw. 33(5), 20–26 (2019)CrossRef
Metadaten
Titel
PEES-IMP: lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment
verfasst von
Sunitha Pachala
Ch. Rupa
L. Sumalatha
Publikationsdatum
01.05.2022
Verlag
Springer US
Erschienen in
Automated Software Engineering / Ausgabe 1/2022
Print ISSN: 0928-8910
Elektronische ISSN: 1573-7535
DOI
https://doi.org/10.1007/s10515-021-00299-6

Weitere Artikel der Ausgabe 1/2022

Automated Software Engineering 1/2022 Zur Ausgabe