首页> 外文会议>2016 16th IEEE International Conference on Computer and Information Technology >A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage
【24h】

A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage

机译:用于云存储中数据安全共享的可追踪签密方案

获取原文
获取原文并翻译 | 示例

摘要

Nowadays cloud servers become the primary choice to store and share data with multiple recipients. The storage of personal information on cloud servers may result in the exposure of confidential information to unauthorized individuals or organizations. Several solutions employing attribute-based encryption schemes have been proposed for secure sharing of data using cloud servers. However, most of the solutions fail to trace the traitors, who intentionally leaked their data access privileges for personal gain. This paper introduces a traceable ciphertext policy attribute-based signcryption (sign-then-encrypt) scheme to simultaneously realize the notion of traitor-tracing, fine-grained access control, sender anonymity, message integrity, authenticity and sensitivity by extending traceable attribute based encryption scheme using attribute-based signature. Single authority may compromise user's key. Hence to reduce the trust on authority, our proposed scheme employs different authorities for key generation and traitor-tracing. In addition, our proposed scheme preserves message sensitivity by allowing the data-owner to define message category label. We analyze the performance of our scheme with respect to secret key size, ciphertext size, computation cost involves in signcryption and designcryption and compare it with existing schemes to show its efficacy.
机译:如今,云服务器已成为与多个收件人存储和共享数据的主要选择。个人信息在云服务器上的存储可能导致机密信息暴露给未经授权的个人或组织。已经提出了几种使用基于属性的加密方案的解决方案,以使用云服务器安全地共享数据。但是,大多数解决方案都无法追踪叛徒,他们是为了个人利益故意泄漏其数据访问特权的。本文介绍了一种可追溯的基于密文策略属性的签密(sign-then-encrypt)方案,以通过扩展可追溯的基于属性的加密来同时实现叛徒追踪,细粒度访问控制,发件人匿名性,消息完整性,真实性和敏感性的概念使用基于属性的签名的方案。单一权限可能会损害用户的密钥。因此,为了减少对权威的信任,我们提出的方案采用了不同的权威来生成密钥和叛徒追踪。另外,我们提出的方案通过允许数据所有者定义消息类别标签来保留消息敏感性。我们从秘密密钥大小,密文大小,计算成本涉及签密和设计加密的角度分析了该方案的性能,并将其与现有方案进行比较以显示其有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号