TY - GEN
T1 - A traceable signcryption scheme for secure sharing of data in cloud storage
AU - Ahuja, Rohit
AU - Mohanty, Sraban Kumar
AU - Sakurai, Kouichi
PY - 2017/3/10
Y1 - 2017/3/10
N2 - Nowadays cloud servers become the primary choice to store and share data with multiple recipients. The storage of personal information on cloud servers may result in the exposure of confidential information to unauthorized individuals or organizations. Several solutions employing attribute-based encryption schemes have been proposed for secure sharing of data using cloud servers. However, most of the solutions fail to trace the traitors, who intentionally leaked their data access privileges for personal gain. This paper introduces a traceable ciphertext policy attribute-based signcryption (sign-then-encrypt) scheme to simultaneously realize the notion of traitor-tracing, fine-grained access control, sender anonymity, message integrity, authenticity and sensitivity by extending traceable attribute based encryption scheme using attribute-based signature. Single authority may compromise user's key. Hence to reduce the trust on authority, our proposed scheme employs different authorities for key generation and traitor-tracing. In addition, our proposed scheme preserves message sensitivity by allowing the data-owner to define message category label. We analyze the performance of our scheme with respect to secret key size, ciphertext size, computation cost involves in signcryption and designcryption and compare it with existing schemes to show its efficacy.
AB - Nowadays cloud servers become the primary choice to store and share data with multiple recipients. The storage of personal information on cloud servers may result in the exposure of confidential information to unauthorized individuals or organizations. Several solutions employing attribute-based encryption schemes have been proposed for secure sharing of data using cloud servers. However, most of the solutions fail to trace the traitors, who intentionally leaked their data access privileges for personal gain. This paper introduces a traceable ciphertext policy attribute-based signcryption (sign-then-encrypt) scheme to simultaneously realize the notion of traitor-tracing, fine-grained access control, sender anonymity, message integrity, authenticity and sensitivity by extending traceable attribute based encryption scheme using attribute-based signature. Single authority may compromise user's key. Hence to reduce the trust on authority, our proposed scheme employs different authorities for key generation and traitor-tracing. In addition, our proposed scheme preserves message sensitivity by allowing the data-owner to define message category label. We analyze the performance of our scheme with respect to secret key size, ciphertext size, computation cost involves in signcryption and designcryption and compare it with existing schemes to show its efficacy.
UR - http://www.scopus.com/inward/record.url?scp=85017392933&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85017392933&partnerID=8YFLogxK
U2 - 10.1109/CIT.2016.52
DO - 10.1109/CIT.2016.52
M3 - Conference contribution
AN - SCOPUS:85017392933
T3 - Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016
SP - 524
EP - 531
BT - Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 16th IEEE International Conference on Computer and Information Technology, CIT 2016
Y2 - 7 December 2016 through 10 December 2016
ER -