Skip to main content
Log in

Towards secure and cost-effective fuzzy access control in mobile cloud computing

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In this article, we suggest a secure and cost-effective fuzzy access control protocol in mobile cloud computing. It is especially designed for small and medium enterprises (SMEs) providing business-to-customers services. Our protocol allows the SME to outsource its services to a cloud to reduce the running cost. At the same time, it does not require any communication between the cloud and the SME during user authentication stage. That is, SME can be offline after users have been registered. Users directly deal with the cloud for gaining access. This helps the SME to save a lot of resources, including a large bandwidth connecting with the cloud and a strong firewall system. Meanwhile, the user database never leaves the SME. In addition, our protocol can withstand common attacks such as dictionary attacks for server and phishing attacks for client. Our security protection is especially important for mobile users as mobile devices are easily exposed to such attacks. Furthermore, our protocol provides user traceability to SME and it is very efficient for mobile devices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Analytics SP (2013) Mobile cloud platforms: the back end of mobile apps. http://www.reportlinker.com/p01650001-summary/Mobile-Cloud-Platforms-The-Back-end-of-Mobile-Apps.html

  • Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (S&P 2007), 20–23 May 2007, Oakland, IEEE Computer Society, pp 321–334 (2007)

  • Boneh D, Boyen X (2008) Short signatures without random oracles and the SDH assumption in bilinear groups. J Cryptol 21(2):149–177

    Article  MathSciNet  MATH  Google Scholar 

  • Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319

    Article  MathSciNet  MATH  Google Scholar 

  • Caro AD (2015) The java pairing based cryptography library (jpbc). http://libeccio.dia.unisa.it/projects/jpbc/

  • Chen X, Li J, Huang X, Li J, Xiang Y, Wong DS (2014) Secure outsourced attribute-based signatures. IEEE Trans Parallel Distrib Syst 25(12):3285–3294

    Article  Google Scholar 

  • Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Canetti R, Garay JA (eds) Advances in cryptology—CRYPTO 2013–33rd annual cryptology conference, Santa Barbara, August 18–22, 2013. Proceedings part II. Lecture notes in computer science, vol 8043. Springer, pp 479–499 (2013)

  • Goldreich O, Goldwasser S, Micali S (1986) How to construct random functions. J ACM 33(4):792–807

    Article  MathSciNet  MATH  Google Scholar 

  • Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, di Vimercati SDC (eds) Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, October 30–November 3, 2006. ACM, pp 89–98 (2006)

  • Hohenberger S, Waters B (2013) Attribute-based encryption with fast decryption. In: Kurosawa K, Hanaoka G (eds) Public-key cryptography—PKC 2013—16th international conference on practice and theory in public-key cryptography, Nara, February 26–March 1, 2013. Proceedings Lecture Notes in Computer Science, vol 7778. Springer, pp 162–179 (2013)

  • Hohenberger S, Waters B (2014) Online/offline attribute-based encryption. In: Krawczyk H (ed) Public-key cryptography—PKC 2014–17th international conference on practice and theory in public-key cryptography, Buenos Aires, March 26–28, 2014. Proceedings lecture notes in computer science, vol 8383. Springer, pp 293–310 (2014)

  • Lewko AB, Waters B (2011) Decentralizing attribute-based encryption. In: Paterson KG (2011), pp 568–588

  • Lewko AB, Waters B (2011) Unbounded HIBE and attribute-based encryption. In: Paterson KG (2011), pp 547–567

  • Lewko AB, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini R, Canetti R (2012), pp 180–198

  • Li J, Chen X, Huang X (2015) New attribute-based authentication and its application in anonymous cloud access service. IJWGS 11(1):125–141

    Article  Google Scholar 

  • Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  • Liu Z, Weng J, Li J, Yang J, Fu C, Jia C (2015) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Computi, pp 1–13

  • Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Kiayias A (ed) Topics in cryptology—CT-RSA 2011–the cryptographers’ track at the RSA conference 2011, San Francisco, February 14–18, 2011. Proceedings Lecture Notes in Computer Science, vol 6558. Springer, pp 376–392

  • Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Ning P, di Vimercati SDC, Syverson PF (eds) Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, October 28–31, 2007. ACM, pp. 195–203 (2007)

  • Paterson KG (ed) Advances in cryptology—EUROCRYPT 2011–30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, May 15–19, 2011. Proceedings lecture notes in computer science, vol 6632. Springer (2011)

  • Pirretti M, Traynor P, McDaniel P, Waters B (2010) Secure attribute-based systems. J Comput Secur 18(5):799–837

    Article  Google Scholar 

  • Rouselakis Y, Waters B (2013) Practical constructions and new proof methods for large universe attribute-based encryption. In: Sadeghi A, Gligor VD, Yung M (eds) 2013 ACM SIGSAC conference on computer and communications security, CCS’13, Berlin, November 4–8, 2013. ACM, pp 463–474 (2013)

  • Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Böhme R, Okamoto T (eds) Financial Cryptography and Data Security–19th International Conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015, Revised selected papers. Lecture notes in computer science, vol 8975. Springer, pp 315–332 (2015)

  • Safavi-Naini R, Canetti R (eds) (2012) Advances in Cryptology—CRYPTO 2012–32nd annual cryptology conference, Santa Barbara, August 19–23, 2012. Proceedings lecture notes in computer science, vol 7417. Springer

  • Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini R, Canetti R (2012), pp 199–217

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT 2005, 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, May 22–26, 2005, Proceedings lecture notes in computer science, vol 3494. Springer, pp 457–473

  • Schnorr C (1989) Efficient identification and signatures for smart cards. In: Brassard G (ed) Advances in cryptology—CRYPTO ’89, 9th annual international cryptology conference, Santa Barbara, August 20–24, 1989, Proceedings lecture notes in computer science, vol 435. Springer, pp 239–252

  • Vaudenay S (2005) A classical introduction to cryptography: applications for communications security. Springer

  • Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) Public key cryptography—PKC 2011–14th international conference on practice and theory in public key cryptography, Taormina, March 6–9, 2011. Proceedings lecture notes in computer science, vol 6571. Springer, pp 53–70

  • Wei J, Huang X, Hu X, Liu W (2015) Revocable threshold attribute-based signature against signing key exposure. In: Lopez J, Wu Y (eds) Information security practice and experience–11th international conference, ISPEC 2015, Beijing, May 5–8, 2015. Proceedings lecture notes in computer science, vol 9065. Springer, pp 316–330

  • Wu Z, Liang B, You L, Jian Z, Li J (2015) High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput, pp 1–12

  • Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (61472083, 61402110, U1405255), Fok Ying Tung Education Foundation (141065), ISN Research Fund (ISN15-03), the Scientific Research Foundation for the Returned Overseas Chinese Scholars, Ministry of Education of China, and Fujian Normal University Innovative Research Team (IRTL1207).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Wu.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Communicated by V. Loia.

W. Wu and S. Hu contributed equally to this work and should be considered as the co-first authors.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, W., Hu, S., Yang, X. et al. Towards secure and cost-effective fuzzy access control in mobile cloud computing. Soft Comput 21, 2643–2649 (2017). https://doi.org/10.1007/s00500-015-1964-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-015-1964-2

Keywords

Navigation