A traceable signcryption scheme for secure sharing of data in cloud storage

Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Nowadays cloud servers become the primary choice to store and share data with multiple recipients. The storage of personal information on cloud servers may result in the exposure of confidential information to unauthorized individuals or organizations. Several solutions employing attribute-based encryption schemes have been proposed for secure sharing of data using cloud servers. However, most of the solutions fail to trace the traitors, who intentionally leaked their data access privileges for personal gain. This paper introduces a traceable ciphertext policy attribute-based signcryption (sign-then-encrypt) scheme to simultaneously realize the notion of traitor-tracing, fine-grained access control, sender anonymity, message integrity, authenticity and sensitivity by extending traceable attribute based encryption scheme using attribute-based signature. Single authority may compromise user's key. Hence to reduce the trust on authority, our proposed scheme employs different authorities for key generation and traitor-tracing. In addition, our proposed scheme preserves message sensitivity by allowing the data-owner to define message category label. We analyze the performance of our scheme with respect to secret key size, ciphertext size, computation cost involves in signcryption and designcryption and compare it with existing schemes to show its efficacy.

Original languageEnglish
Title of host publicationProceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages524-531
Number of pages8
ISBN (Electronic)9781509043149
DOIs
Publication statusPublished - Mar 10 2017
Event16th IEEE International Conference on Computer and Information Technology, CIT 2016 - Nadi, Fiji
Duration: Dec 7 2016Dec 10 2016

Publication series

NameProceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016

Other

Other16th IEEE International Conference on Computer and Information Technology, CIT 2016
CountryFiji
CityNadi
Period12/7/1612/10/16

Fingerprint

Servers
Cryptography
Access control
Labels
Costs

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Science Applications
  • Computer Networks and Communications
  • Information Systems
  • Safety, Risk, Reliability and Quality

Cite this

Ahuja, R., Mohanty, S. K., & Sakurai, K. (2017). A traceable signcryption scheme for secure sharing of data in cloud storage. In Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016 (pp. 524-531). [7876382] (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CIT.2016.52

A traceable signcryption scheme for secure sharing of data in cloud storage. / Ahuja, Rohit; Mohanty, Sraban Kumar; Sakurai, Kouichi.

Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., 2017. p. 524-531 7876382 (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ahuja, R, Mohanty, SK & Sakurai, K 2017, A traceable signcryption scheme for secure sharing of data in cloud storage. in Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016., 7876382, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016, Institute of Electrical and Electronics Engineers Inc., pp. 524-531, 16th IEEE International Conference on Computer and Information Technology, CIT 2016, Nadi, Fiji, 12/7/16. https://doi.org/10.1109/CIT.2016.52
Ahuja R, Mohanty SK, Sakurai K. A traceable signcryption scheme for secure sharing of data in cloud storage. In Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc. 2017. p. 524-531. 7876382. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016). https://doi.org/10.1109/CIT.2016.52
Ahuja, Rohit ; Mohanty, Sraban Kumar ; Sakurai, Kouichi. / A traceable signcryption scheme for secure sharing of data in cloud storage. Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., 2017. pp. 524-531 (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).
@inproceedings{a6c97408a23844a0ad331be625191f9a,
title = "A traceable signcryption scheme for secure sharing of data in cloud storage",
abstract = "Nowadays cloud servers become the primary choice to store and share data with multiple recipients. The storage of personal information on cloud servers may result in the exposure of confidential information to unauthorized individuals or organizations. Several solutions employing attribute-based encryption schemes have been proposed for secure sharing of data using cloud servers. However, most of the solutions fail to trace the traitors, who intentionally leaked their data access privileges for personal gain. This paper introduces a traceable ciphertext policy attribute-based signcryption (sign-then-encrypt) scheme to simultaneously realize the notion of traitor-tracing, fine-grained access control, sender anonymity, message integrity, authenticity and sensitivity by extending traceable attribute based encryption scheme using attribute-based signature. Single authority may compromise user's key. Hence to reduce the trust on authority, our proposed scheme employs different authorities for key generation and traitor-tracing. In addition, our proposed scheme preserves message sensitivity by allowing the data-owner to define message category label. We analyze the performance of our scheme with respect to secret key size, ciphertext size, computation cost involves in signcryption and designcryption and compare it with existing schemes to show its efficacy.",
author = "Rohit Ahuja and Mohanty, {Sraban Kumar} and Kouichi Sakurai",
year = "2017",
month = "3",
day = "10",
doi = "10.1109/CIT.2016.52",
language = "English",
series = "Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "524--531",
booktitle = "Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016",
address = "United States",

}

TY - GEN

T1 - A traceable signcryption scheme for secure sharing of data in cloud storage

AU - Ahuja, Rohit

AU - Mohanty, Sraban Kumar

AU - Sakurai, Kouichi

PY - 2017/3/10

Y1 - 2017/3/10

N2 - Nowadays cloud servers become the primary choice to store and share data with multiple recipients. The storage of personal information on cloud servers may result in the exposure of confidential information to unauthorized individuals or organizations. Several solutions employing attribute-based encryption schemes have been proposed for secure sharing of data using cloud servers. However, most of the solutions fail to trace the traitors, who intentionally leaked their data access privileges for personal gain. This paper introduces a traceable ciphertext policy attribute-based signcryption (sign-then-encrypt) scheme to simultaneously realize the notion of traitor-tracing, fine-grained access control, sender anonymity, message integrity, authenticity and sensitivity by extending traceable attribute based encryption scheme using attribute-based signature. Single authority may compromise user's key. Hence to reduce the trust on authority, our proposed scheme employs different authorities for key generation and traitor-tracing. In addition, our proposed scheme preserves message sensitivity by allowing the data-owner to define message category label. We analyze the performance of our scheme with respect to secret key size, ciphertext size, computation cost involves in signcryption and designcryption and compare it with existing schemes to show its efficacy.

AB - Nowadays cloud servers become the primary choice to store and share data with multiple recipients. The storage of personal information on cloud servers may result in the exposure of confidential information to unauthorized individuals or organizations. Several solutions employing attribute-based encryption schemes have been proposed for secure sharing of data using cloud servers. However, most of the solutions fail to trace the traitors, who intentionally leaked their data access privileges for personal gain. This paper introduces a traceable ciphertext policy attribute-based signcryption (sign-then-encrypt) scheme to simultaneously realize the notion of traitor-tracing, fine-grained access control, sender anonymity, message integrity, authenticity and sensitivity by extending traceable attribute based encryption scheme using attribute-based signature. Single authority may compromise user's key. Hence to reduce the trust on authority, our proposed scheme employs different authorities for key generation and traitor-tracing. In addition, our proposed scheme preserves message sensitivity by allowing the data-owner to define message category label. We analyze the performance of our scheme with respect to secret key size, ciphertext size, computation cost involves in signcryption and designcryption and compare it with existing schemes to show its efficacy.

UR - http://www.scopus.com/inward/record.url?scp=85017392933&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85017392933&partnerID=8YFLogxK

U2 - 10.1109/CIT.2016.52

DO - 10.1109/CIT.2016.52

M3 - Conference contribution

AN - SCOPUS:85017392933

T3 - Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016

SP - 524

EP - 531

BT - Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -