Abstract
Cloud computing is a powerful technology because it provides users with attractive online files sharing services. However, security and privacy are significant challenges since the cloud cannot be fully trusted due the traditional centralized management system. This paper proposes a certificateless proxy re-encryption as an efficient mechanism to secure access over outsourced data. The proposed scheme relies on blockchain technology for decentralized security administration and data protection. Besides, the scheme achieves data confidentiality and efficient revocation mechanism. Moreover, the security analysis proves the confidentiality and integrity of the data stored in the cloud server. Finally, we evaluate the performance of the proposed scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1), 50–55 (2008)
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: 2009 IEEE International Conference on Cloud Computing, pp. 109–116. IEEE (2009)
Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: Fairaccess: a new blockchain-based access control framework for the internet of things. Secur. Commun. Netw. 9(18), 5943–5964 (2016)
Ouaddah, A., Elkalam, A.A., Ouahman, A.A.: Towards a novel privacy-preserving access control model based on blockchain technology in iot. Europe and MENA Cooperation Advances in Information and Communication Technologies, vol. 520. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46568-5_53
Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops, pp. 180–184. IEEE (2015)
Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc, Newton (2015)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29
Elhabob, R., Zhao, Y., Sella, I., Xiong, H.: Efficient certificateless public key cryptography with equality test for internet of vehicles. In: IEEE Access (2019)
Li, F., Hong, J., Omala, A.A.: Efficient certificateless access control for industrial internet of things. Future Gener. Comput. Syst. 76, 285–292 (2017)
Hassan, A., Eltayieb, N., Elhabob, R., Li, F.: A provably secure certificateless user authentication protocol for mobile client-server environment. Advances in Internetworking, Data and Web Technologies, vol. 6. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-59463-7_59
Xu, L., Wu, X., Zhang, X.: Cl-pre: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 87–88. ACM (2012)
Nakamoto, S., et al.: Bitcoin: a peer-to-peer electronic cash system (2008)
Dong, C., Wang, Y., Aldweesh, A., McCorry, P., van Moorsel, A.: Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 211–227. ACM (2017)
Huang, H., Chen, X., Wu, Q., Huang, X., Shen, J.: Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78, 850–858 (2018)
McCorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 357–375. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70972-7_20
Wang, Z., Zhang, H., Song, X., Zhang, H.: Consensus problems for discrete-time agents with communication delay. Int. J. Control Autom. Syst. 15(4), 1515–1523 (2017)
Reilly, E., Maloney, M., Siegel, M., Falco, G.: A smart city IOT integrity-first communication protocol via an ethereum blockchain light client. In: Proceedings of the International Workshop on Software Engineering Research and Practices for the Internet of Things (SERP4IoT 2019), Marrakech, Morocco, pp. 15–19 (2019)
Yaeger, K., Martini, M., Rasouli, J., Costa, A.: Emerging blockchain technology solutions for modern healthcare infrastructure. J. Sci. Innov. Med. 2(1) (2019)
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)
Ibraimi, L., Tang, Q., Hartel, P., Jonker, W.: A type-and-identity-based proxy re-encryption scheme and its application in healthcare. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 185–198. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85259-9_12
Taban, G., Cárdenas, A.A., Gligor, V.D.: Towards a secure and interoperable DRM architecture. In: Proceedings of the ACM Workshop on Digital Rights Management, pp. 69–78. ACM (2006)
Lin, X.J., Sun, L., Qu, H.: An efficient RSA-based certificateless public key encryption scheme. Dis. Appl. Math. 241, 39–47 (2018)
Guo, H., Zhang, Z., Zhang, J., Chen, C.: Towards a secure certificateless proxy re-encryption scheme. In: Susilo, W., Reyhanitabar, R. (eds.) ProvSec 2013. LNCS, vol. 8209, pp. 330–346. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41227-1_19
Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2013)
Sun, Y., Li, H.: Short-ciphertext and bdh-based CCA2 secure certificateless encryption. Sci. China Inf. Sci. 53(10), 2005–2015 (2010)
Lynn, B., et al.: Pbc: the pairing-based cryptography library. http://crypto.stanford.edu/pbc
Acknowledgement
This work is supported by the National Natural Science Foundation of China (grant no. 61872058).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Eltayieb, N., Sun, L., Wang, K., Li, F. (2019). A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain. In: Shen, B., Wang, B., Han, J., Yu, Y. (eds) Frontiers in Cyber Security. FCS 2019. Communications in Computer and Information Science, vol 1105. Springer, Singapore. https://doi.org/10.1007/978-981-15-0818-9_19
Download citation
DOI: https://doi.org/10.1007/978-981-15-0818-9_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0817-2
Online ISBN: 978-981-15-0818-9
eBook Packages: Computer ScienceComputer Science (R0)