Skip to main content

IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12454))

  • 1778 Accesses

Abstract

Subscribers own their subscription credentials when they accesses mobile media. They cannot extend their subscription credentials without permission. We propose an Access Control Scheme supporting Informal non-Malleable security (IM-ACS) for mobile media. In our scheme, Attribute Based Encryption method is applied to bring de-couple and fine-grain features when publishers share their media data with subscribers. All-or-Nothing transfer method is used to ensure the efficiency when publishers encrypt their media data before upload it onto cloud server. The method of re-encryption on cloud is adopted to ensure that subscribers cannot obtain any acknowledge from the previous data accesses unless publisher allow them to. This scheme is analyzed to be secure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ion, M., Russello, G., Crispo, B.: An implementation of event and filter confidentiality in pub/sub systems and its application to e-Health. In: 17th ACM Conference on Computer and Communications Security, CCS2010, Chicago, IL, United states, 2010, pp. 696–698

    Google Scholar 

  2. Tariq, M.A., Koldehofe, B., Rothermel, K.: Securing broker-less publish/subscribe systems using identity-based encryption. IEEE Trans. Parallel Distrib. Syst. 25, 518–528 (2014)

    Article  Google Scholar 

  3. Teng, W., Yang, G., Xiang, Y., Zhang, T., Wang, D.: Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans. Cloud Comput. 5, 617–627 (2017)

    Article  Google Scholar 

  4. Qiu, H., Qiu, M., Lu, Z., Memmi, G.: An efficient key distribution system for data fusion in V2X heterogeneous networks. Inf. Fusion 50, 212–220 (2019)

    Article  Google Scholar 

  5. Tian, Z., Li, M., Qiu, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)

    Article  Google Scholar 

  6. Pass, R., Shelat, A., Vaikuntanathan, V.: Bounded CCA2-Secure Non-Malleable Encryption. MIT (2006)

    Google Scholar 

  7. Jiguo, L., Wei, Y., Jinguang, H., Yichen, Z., Jian, S.: User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Syst. J. 12, 1767–1777 (2018)

    Article  Google Scholar 

  8. Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25, 2271–2282 (2013)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the Project of Jiangxi Provincial Social Science Planning (No. 17XW08), the Science and Technology Research Project of Jiangxi Provincial of Education Department (No. GJJ180905), the Project of Hubei Provincial Science Foundation (No. 2018CFB109), the Research Project of Hubei Provincial Department of Education (No. Q20191710), and the MOE (Ministry of Education in China) Project of Humanities and Social Sciences (No. 20YJAZH112).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiaoli Shi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deng, A., Shi, J., He, K., Xu, F. (2020). IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System. In: Qiu, M. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2020. Lecture Notes in Computer Science(), vol 12454. Springer, Cham. https://doi.org/10.1007/978-3-030-60248-2_6

Download citation

Publish with us

Policies and ethics