Abstract
Due to plenty of cloud-based applications emerging and booming recently, data owners always store their data in cloud and share them to data consumers through cloud servers. For security equirements, data owners are often asked to provide authentication tags to the corresponding data. Data consumers obtain the authenticated data from the cloud and expect the computation on the authenticated data. However, it is impractical for the mobile data owners to be online all the time and provide the authenticated computing results according to various data consumers’ request. To tackle this issue, we propose an efficient and secure delegated multi-authentication protocol for mobile data owners in cloud, which enables the mobile data owners to conditionally delegate signing right to specified cloud servers without exposing the secret signing keys. The cloud servers provide the authentication services when data owners are not available. The security is built on an identity-based multi-proxy signature (IBMPS) scheme, which depends on the cubic residue assumption, equaling to the factorization assumption. Furthermore, our protocol is efficient compared to the pairing based schemes and the overhead is almost independent of the number of cloud servers.
This work was supported by the National Natural Science Foundation of China (No. 61402282), Shanghai Sailing Program (No. 14YF1410400), Youth Scholars of Shanghai Higher Education Institutions (No. ZZHY14025), Open Foundation of State key Laboratory of Networking and Switching Technology of BUPT (No. SKLNST-2013-1-12), ECNU Fund for Graduate Student’s Scientific Research, Innovation, and Practice (No. YJSKC2015-30) and JSPS KAKENHI (No. 26730056, 15K15976), JSPS A3 Foresight Program.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dong, M., Li, H., Ota, K., Zhu, H.: Hvsto: efficient privacy preserving hybrid storage in cloud data center. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2014), pp. 529–534 (2014)
Dong, M., Li, H., Ota, K., Yang, L.T., Zhu, H.: Multicloud-based evacuation services for emergency management. IEEE Cloud Comput. 1(4), 50–59 (2014)
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)
Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: INFOCOM 2014, pp. 2121–2129 (2014)
Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., shelat, A., Waters, B.: Computing on authenticated data. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 1–20. Springer, Heidelberg (2012)
Jia, W., Zhu, H., Cao, Z., Wei, L., Lin, X.: SDSM: a secure data service mechanism in mobile cloud computing. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2011), pp. 1060–1065 (2011)
Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57–115 (2012)
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)
Wang, Z., Sun, G., Chen, D.: A new definition of homomorphic signature for identity management in mobile cloud computing. J. Comput. Syst. Sci. 80(3), 546–553 (2014)
Yuan, J., Yu, S.: Flexible and publicly verifiable aggregation query for outsourced databases in cloud. In: IEEE CNS 2013, pp. 520–524 (2013)
Cao, F., Cao, Z.: A secure identity-based multi-proxy signature scheme. Comput. Electr. Eng. 35(1), 86–95 (2009)
Sahu, R.A., Padhye, S.: Provable secure identity-based multi-proxy signature scheme. Int. J. Commun. Syst. 28(3), 497–512 (2015)
Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, Cambridge (2009)
Wang, Z., Wang, L., Zheng, S., Yang, Y., Hu, Z.: Provably secure and efficient identity-based signature scheme based on cubic residues. Int. J. Netw. Secur. 14(1), 33–38 (2012)
He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11), 1432–1442 (2012)
Li, X., Chen, K.: Id-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1), 437–450 (2005)
Bagherzandi, A., Jarecki, S.: Identity-based aggregate and multi-signature schemes based on RSA. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 480–498. Springer, Heidelberg (2010)
Joye, M., Libert, B.: Efficient cryptosystems from \(2^{k}\)-th power residue symbols. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 76–92. Springer, Heidelberg (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Wei, L., Zhang, L., Zhang, K., Dong, M. (2015). An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_60
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_60
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)