Skip to main content
Erschienen in: Soft Computing 10/2017

11.12.2015 | Methodologies and Application

Towards secure and cost-effective fuzzy access control in mobile cloud computing

verfasst von: Wei Wu, Shun Hu, Xu Yang, Joseph K. Liu, Man Ho Au

Erschienen in: Soft Computing | Ausgabe 10/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this article, we suggest a secure and cost-effective fuzzy access control protocol in mobile cloud computing. It is especially designed for small and medium enterprises (SMEs) providing business-to-customers services. Our protocol allows the SME to outsource its services to a cloud to reduce the running cost. At the same time, it does not require any communication between the cloud and the SME during user authentication stage. That is, SME can be offline after users have been registered. Users directly deal with the cloud for gaining access. This helps the SME to save a lot of resources, including a large bandwidth connecting with the cloud and a strong firewall system. Meanwhile, the user database never leaves the SME. In addition, our protocol can withstand common attacks such as dictionary attacks for server and phishing attacks for client. Our security protection is especially important for mobile users as mobile devices are easily exposed to such attacks. Furthermore, our protocol provides user traceability to SME and it is very efficient for mobile devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (S&P 2007), 20–23 May 2007, Oakland, IEEE Computer Society, pp 321–334 (2007) Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (S&P 2007), 20–23 May 2007, Oakland, IEEE Computer Society, pp 321–334 (2007)
Zurück zum Zitat Boneh D, Boyen X (2008) Short signatures without random oracles and the SDH assumption in bilinear groups. J Cryptol 21(2):149–177MathSciNetCrossRefMATH Boneh D, Boyen X (2008) Short signatures without random oracles and the SDH assumption in bilinear groups. J Cryptol 21(2):149–177MathSciNetCrossRefMATH
Zurück zum Zitat Chen X, Li J, Huang X, Li J, Xiang Y, Wong DS (2014) Secure outsourced attribute-based signatures. IEEE Trans Parallel Distrib Syst 25(12):3285–3294CrossRef Chen X, Li J, Huang X, Li J, Xiang Y, Wong DS (2014) Secure outsourced attribute-based signatures. IEEE Trans Parallel Distrib Syst 25(12):3285–3294CrossRef
Zurück zum Zitat Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Canetti R, Garay JA (eds) Advances in cryptology—CRYPTO 2013–33rd annual cryptology conference, Santa Barbara, August 18–22, 2013. Proceedings part II. Lecture notes in computer science, vol 8043. Springer, pp 479–499 (2013) Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Canetti R, Garay JA (eds) Advances in cryptology—CRYPTO 2013–33rd annual cryptology conference, Santa Barbara, August 18–22, 2013. Proceedings part II. Lecture notes in computer science, vol 8043. Springer, pp 479–499 (2013)
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, di Vimercati SDC (eds) Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, October 30–November 3, 2006. ACM, pp 89–98 (2006) Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, di Vimercati SDC (eds) Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, October 30–November 3, 2006. ACM, pp 89–98 (2006)
Zurück zum Zitat Hohenberger S, Waters B (2013) Attribute-based encryption with fast decryption. In: Kurosawa K, Hanaoka G (eds) Public-key cryptography—PKC 2013—16th international conference on practice and theory in public-key cryptography, Nara, February 26–March 1, 2013. Proceedings Lecture Notes in Computer Science, vol 7778. Springer, pp 162–179 (2013) Hohenberger S, Waters B (2013) Attribute-based encryption with fast decryption. In: Kurosawa K, Hanaoka G (eds) Public-key cryptography—PKC 2013—16th international conference on practice and theory in public-key cryptography, Nara, February 26–March 1, 2013. Proceedings Lecture Notes in Computer Science, vol 7778. Springer, pp 162–179 (2013)
Zurück zum Zitat Hohenberger S, Waters B (2014) Online/offline attribute-based encryption. In: Krawczyk H (ed) Public-key cryptography—PKC 2014–17th international conference on practice and theory in public-key cryptography, Buenos Aires, March 26–28, 2014. Proceedings lecture notes in computer science, vol 8383. Springer, pp 293–310 (2014) Hohenberger S, Waters B (2014) Online/offline attribute-based encryption. In: Krawczyk H (ed) Public-key cryptography—PKC 2014–17th international conference on practice and theory in public-key cryptography, Buenos Aires, March 26–28, 2014. Proceedings lecture notes in computer science, vol 8383. Springer, pp 293–310 (2014)
Zurück zum Zitat Lewko AB, Waters B (2011) Decentralizing attribute-based encryption. In: Paterson KG (2011), pp 568–588 Lewko AB, Waters B (2011) Decentralizing attribute-based encryption. In: Paterson KG (2011), pp 568–588
Zurück zum Zitat Lewko AB, Waters B (2011) Unbounded HIBE and attribute-based encryption. In: Paterson KG (2011), pp 547–567 Lewko AB, Waters B (2011) Unbounded HIBE and attribute-based encryption. In: Paterson KG (2011), pp 547–567
Zurück zum Zitat Lewko AB, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini R, Canetti R (2012), pp 180–198 Lewko AB, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini R, Canetti R (2012), pp 180–198
Zurück zum Zitat Li J, Chen X, Huang X (2015) New attribute-based authentication and its application in anonymous cloud access service. IJWGS 11(1):125–141CrossRef Li J, Chen X, Huang X (2015) New attribute-based authentication and its application in anonymous cloud access service. IJWGS 11(1):125–141CrossRef
Zurück zum Zitat Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRef Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRef
Zurück zum Zitat Liu Z, Weng J, Li J, Yang J, Fu C, Jia C (2015) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Computi, pp 1–13 Liu Z, Weng J, Li J, Yang J, Fu C, Jia C (2015) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Computi, pp 1–13
Zurück zum Zitat Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Kiayias A (ed) Topics in cryptology—CT-RSA 2011–the cryptographers’ track at the RSA conference 2011, San Francisco, February 14–18, 2011. Proceedings Lecture Notes in Computer Science, vol 6558. Springer, pp 376–392 Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Kiayias A (ed) Topics in cryptology—CT-RSA 2011–the cryptographers’ track at the RSA conference 2011, San Francisco, February 14–18, 2011. Proceedings Lecture Notes in Computer Science, vol 6558. Springer, pp 376–392
Zurück zum Zitat Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Ning P, di Vimercati SDC, Syverson PF (eds) Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, October 28–31, 2007. ACM, pp. 195–203 (2007) Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Ning P, di Vimercati SDC, Syverson PF (eds) Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, October 28–31, 2007. ACM, pp. 195–203 (2007)
Zurück zum Zitat Paterson KG (ed) Advances in cryptology—EUROCRYPT 2011–30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, May 15–19, 2011. Proceedings lecture notes in computer science, vol 6632. Springer (2011) Paterson KG (ed) Advances in cryptology—EUROCRYPT 2011–30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, May 15–19, 2011. Proceedings lecture notes in computer science, vol 6632. Springer (2011)
Zurück zum Zitat Pirretti M, Traynor P, McDaniel P, Waters B (2010) Secure attribute-based systems. J Comput Secur 18(5):799–837CrossRef Pirretti M, Traynor P, McDaniel P, Waters B (2010) Secure attribute-based systems. J Comput Secur 18(5):799–837CrossRef
Zurück zum Zitat Rouselakis Y, Waters B (2013) Practical constructions and new proof methods for large universe attribute-based encryption. In: Sadeghi A, Gligor VD, Yung M (eds) 2013 ACM SIGSAC conference on computer and communications security, CCS’13, Berlin, November 4–8, 2013. ACM, pp 463–474 (2013) Rouselakis Y, Waters B (2013) Practical constructions and new proof methods for large universe attribute-based encryption. In: Sadeghi A, Gligor VD, Yung M (eds) 2013 ACM SIGSAC conference on computer and communications security, CCS’13, Berlin, November 4–8, 2013. ACM, pp 463–474 (2013)
Zurück zum Zitat Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Böhme R, Okamoto T (eds) Financial Cryptography and Data Security–19th International Conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015, Revised selected papers. Lecture notes in computer science, vol 8975. Springer, pp 315–332 (2015) Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Böhme R, Okamoto T (eds) Financial Cryptography and Data Security–19th International Conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015, Revised selected papers. Lecture notes in computer science, vol 8975. Springer, pp 315–332 (2015)
Zurück zum Zitat Safavi-Naini R, Canetti R (eds) (2012) Advances in Cryptology—CRYPTO 2012–32nd annual cryptology conference, Santa Barbara, August 19–23, 2012. Proceedings lecture notes in computer science, vol 7417. Springer Safavi-Naini R, Canetti R (eds) (2012) Advances in Cryptology—CRYPTO 2012–32nd annual cryptology conference, Santa Barbara, August 19–23, 2012. Proceedings lecture notes in computer science, vol 7417. Springer
Zurück zum Zitat Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini R, Canetti R (2012), pp 199–217 Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini R, Canetti R (2012), pp 199–217
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT 2005, 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, May 22–26, 2005, Proceedings lecture notes in computer science, vol 3494. Springer, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT 2005, 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, May 22–26, 2005, Proceedings lecture notes in computer science, vol 3494. Springer, pp 457–473
Zurück zum Zitat Schnorr C (1989) Efficient identification and signatures for smart cards. In: Brassard G (ed) Advances in cryptology—CRYPTO ’89, 9th annual international cryptology conference, Santa Barbara, August 20–24, 1989, Proceedings lecture notes in computer science, vol 435. Springer, pp 239–252 Schnorr C (1989) Efficient identification and signatures for smart cards. In: Brassard G (ed) Advances in cryptology—CRYPTO ’89, 9th annual international cryptology conference, Santa Barbara, August 20–24, 1989, Proceedings lecture notes in computer science, vol 435. Springer, pp 239–252
Zurück zum Zitat Vaudenay S (2005) A classical introduction to cryptography: applications for communications security. Springer Vaudenay S (2005) A classical introduction to cryptography: applications for communications security. Springer
Zurück zum Zitat Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) Public key cryptography—PKC 2011–14th international conference on practice and theory in public key cryptography, Taormina, March 6–9, 2011. Proceedings lecture notes in computer science, vol 6571. Springer, pp 53–70 Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) Public key cryptography—PKC 2011–14th international conference on practice and theory in public key cryptography, Taormina, March 6–9, 2011. Proceedings lecture notes in computer science, vol 6571. Springer, pp 53–70
Zurück zum Zitat Wei J, Huang X, Hu X, Liu W (2015) Revocable threshold attribute-based signature against signing key exposure. In: Lopez J, Wu Y (eds) Information security practice and experience–11th international conference, ISPEC 2015, Beijing, May 5–8, 2015. Proceedings lecture notes in computer science, vol 9065. Springer, pp 316–330 Wei J, Huang X, Hu X, Liu W (2015) Revocable threshold attribute-based signature against signing key exposure. In: Lopez J, Wu Y (eds) Information security practice and experience–11th international conference, ISPEC 2015, Beijing, May 5–8, 2015. Proceedings lecture notes in computer science, vol 9065. Springer, pp 316–330
Zurück zum Zitat Wu Z, Liang B, You L, Jian Z, Li J (2015) High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput, pp 1–12 Wu Z, Liang B, You L, Jian Z, Li J (2015) High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput, pp 1–12
Zurück zum Zitat Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef
Metadaten
Titel
Towards secure and cost-effective fuzzy access control in mobile cloud computing
verfasst von
Wei Wu
Shun Hu
Xu Yang
Joseph K. Liu
Man Ho Au
Publikationsdatum
11.12.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 10/2017
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-015-1964-2

Weitere Artikel der Ausgabe 10/2017

Soft Computing 10/2017 Zur Ausgabe

Methodologies and Application

Interval Abel integral equation

Premium Partner