Skip to main content

An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9204))

Abstract

Due to plenty of cloud-based applications emerging and booming recently, data owners always store their data in cloud and share them to data consumers through cloud servers. For security equirements, data owners are often asked to provide authentication tags to the corresponding data. Data consumers obtain the authenticated data from the cloud and expect the computation on the authenticated data. However, it is impractical for the mobile data owners to be online all the time and provide the authenticated computing results according to various data consumers’ request. To tackle this issue, we propose an efficient and secure delegated multi-authentication protocol for mobile data owners in cloud, which enables the mobile data owners to conditionally delegate signing right to specified cloud servers without exposing the secret signing keys. The cloud servers provide the authentication services when data owners are not available. The security is built on an identity-based multi-proxy signature (IBMPS) scheme, which depends on the cubic residue assumption, equaling to the factorization assumption. Furthermore, our protocol is efficient compared to the pairing based schemes and the overhead is almost independent of the number of cloud servers.

This work was supported by the National Natural Science Foundation of China (No. 61402282), Shanghai Sailing Program (No. 14YF1410400), Youth Scholars of Shanghai Higher Education Institutions (No. ZZHY14025), Open Foundation of State key Laboratory of Networking and Switching Technology of BUPT (No. SKLNST-2013-1-12), ECNU Fund for Graduate Student’s Scientific Research, Innovation, and Practice (No. YJSKC2015-30) and JSPS KAKENHI (No. 26730056, 15K15976), JSPS A3 Foresight Program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dong, M., Li, H., Ota, K., Zhu, H.: Hvsto: efficient privacy preserving hybrid storage in cloud data center. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2014), pp. 529–534 (2014)

    Google Scholar 

  2. Dong, M., Li, H., Ota, K., Yang, L.T., Zhu, H.: Multicloud-based evacuation services for emergency management. IEEE Cloud Comput. 1(4), 50–59 (2014)

    Article  Google Scholar 

  3. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)

    Article  Google Scholar 

  4. Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  5. Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: INFOCOM 2014, pp. 2121–2129 (2014)

    Google Scholar 

  6. Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., shelat, A., Waters, B.: Computing on authenticated data. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 1–20. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Jia, W., Zhu, H., Cao, Z., Wei, L., Lin, X.: SDSM: a secure data service mechanism in mobile cloud computing. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2011), pp. 1060–1065 (2011)

    Google Scholar 

  8. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57–115 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  9. Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Wang, Z., Sun, G., Chen, D.: A new definition of homomorphic signature for identity management in mobile cloud computing. J. Comput. Syst. Sci. 80(3), 546–553 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  11. Yuan, J., Yu, S.: Flexible and publicly verifiable aggregation query for outsourced databases in cloud. In: IEEE CNS 2013, pp. 520–524 (2013)

    Google Scholar 

  12. Cao, F., Cao, Z.: A secure identity-based multi-proxy signature scheme. Comput. Electr. Eng. 35(1), 86–95 (2009)

    Article  MATH  Google Scholar 

  13. Sahu, R.A., Padhye, S.: Provable secure identity-based multi-proxy signature scheme. Int. J. Commun. Syst. 28(3), 497–512 (2015)

    Article  Google Scholar 

  14. Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, Cambridge (2009)

    MATH  Google Scholar 

  15. Wang, Z., Wang, L., Zheng, S., Yang, Y., Hu, Z.: Provably secure and efficient identity-based signature scheme based on cubic residues. Int. J. Netw. Secur. 14(1), 33–38 (2012)

    Google Scholar 

  16. He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11), 1432–1442 (2012)

    Article  Google Scholar 

  17. Li, X., Chen, K.: Id-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1), 437–450 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  18. Bagherzandi, A., Jarecki, S.: Identity-based aggregate and multi-signature schemes based on RSA. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 480–498. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  19. Joye, M., Libert, B.: Efficient cryptosystems from \(2^{k}\)-th power residue symbols. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 76–92. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wei, L., Zhang, L., Zhang, K., Dong, M. (2015). An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_60

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21837-3_60

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21836-6

  • Online ISBN: 978-3-319-21837-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics