Skip to main content
Log in

A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Cloud computing has proven to be applicable in smart grid systems with the help of the cloud-based Internet of things (IoT) technology. In this concept, IoT is deployed as a front-end enabling the acquisition of smart grid-related data and its outsourcing to the cloud for data storage purposes. It is obvious that data storage is a pertinent service in cloud computing. However, its wide adoption is hindered by the concern of having a secure access to data without a breach on confidentiality and authentication. To address this problem, we propose a novel data access control scheme that simultaneously accomplishes confidentiality and authentication for cloud-based smart grid systems. Our scheme can enable the storing of encrypted smart grid-related data in the cloud. When a user prefers to access the data, the data owner issues a delegation command to the cloud for data re-encryption. The cloud is unable to acquire any plaintext information on the data. Only authorized users are capable of decrypting the data. Moreover, the integrity and authentication of data can only be verified by the authorized user. We obtain the data access control scheme by proposing a pairing free certificateless signcryption with proxy re-encryption (CLS-PRE) scheme. We prove that our CLS-PRE scheme has indistinguishability against adaptive chosen ciphertext attack under the gap Diffie–Hellman problem and existential unforgeability against adaptive chosen message attack under elliptic curve discrete logarithm problem in the random oracle model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Singh, J., Pasquier, T., Bacon, J., Ko, H., & Eyers, D. (2016). Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of Things Journal, 3(3), 269–284.

    Article  Google Scholar 

  2. Xu, S., Qian, Y., & Hu, R. Q. (2015). On reliability of smart grid neighborhood area networks. IEEE Access, 3(1), 2352–2365.

    Article  Google Scholar 

  3. Xiao, J., Zu, G., Gong, X., & Li, F. (2017). Observation of security region boundary for smart distribution grid. IEEE Transactions on Smart Grid, 8(4), 1731–1738.

    Article  Google Scholar 

  4. Jiang, L., Xu, L. D., Cai, H., Jiang, Z., Bu, F., & Xu, B. (2014). An IoT-oriented data storage framework in cloud computing platform. IEEE Transactions on Industrial Informatics, 10(2), 1443–1451.

    Article  Google Scholar 

  5. Morello, R., De Capua, C., Fulco, G., & Mukhopadhyay, S. C. (2017). A smart power meter to monitor energy flow in smart grids: The role of advanced sensing and IoT in the electric grid of the future. IEEE Sensors Journal, 17(23), 7828–7837.

    Article  Google Scholar 

  6. Li, Y., Cheng, X., Cao, Y., Wang, D., & Yang, L. (2018). Smart choice for the smart grid: Narrowband Internet of Things (NB-IoT). IEEE Internet of Things Journal, 5(3), 1505–1515.

    Article  Google Scholar 

  7. Tian, X., Wang, X., & Zhou, A. (2009). DSP re-encryption: a flexible mechanism for access control enforcement management in DaaS. In Proceeding of CLOUD (pp. 25–32). Bangalore: IEEE.

  8. Liu, Q., Tan, C. C., Wu, J., & Wang, G. (2011) Reliable re-encryption in unreliable clouds. In Proceedings of GLOBECOM (pp. 1–5). Houston: IEEE.

  9. Park, N. (2011). Secure data access control scheme using type-based re-encryption in cloud environment. In Proceedings of semantic methods for knowledge management and communication, SCI (Vol. 381, pp. 319–327). Springer.

  10. Khan, A. N., Kiah, M. L. M., Madani, S. A., Ali, M., Khan, A. U. R., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651.

    Article  Google Scholar 

  11. Li, F., Liu, B., & Hong, J. (2017). An efficient signcryption for data access control in cloud computing. Computing, 99(5), 465–479.

    Article  Google Scholar 

  12. Le, X. H., Lee, S., Butun, I., Khalid, M., Sankar, R., Kim, M., et al. (2009). An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Journal of Communications and Networks, 11(6), 599–606.

    Article  Google Scholar 

  13. Malone-Lee, J. (2002). Identity-based signcryption. Cryptology ePrint Archive, Report 2002/098. https://eprint.iacr.org/2002/098.

  14. Wang, C., & Cao, X. (2011). An improved signcryption with proxy re-encryption and its application. In Proceedings of CIS 2011 (pp. 886–890). Hainan: IEEE.

  15. Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In ACM symposium on information, computer and communications security-ASIACCS 2008 (pp. 369–372). Japan: Tokyo.

  16. Anyembe, A. O., Niyifasha, R., & Li, F. (2016). A provably-secure transmission scheme for wireless body area networks. Journal of Medical Systems, 40(11), 247–261.

    Article  Google Scholar 

  17. Chen, L., & Malone-Lee, J. (2005). Improved identity-based signcryption. In 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland (pp. 362–379). Springer.

  18. Wu, C., & Chen, Z. X. (2008). A new efficient certificateless signcryption scheme. In Proceedings of IEEE international symposium on information science and engineering, ISISE 2008 (Vol. 1, pp. 661–664). Shanghai: IEEE.

  19. Xie, W., & Zhang, Z. (2010). Efficient and provably secure certificateless signcryption from bilinear maps. In Proceedings of IEEE international conference on wireless communications, networking and information security, WCNIS 2010 (pp. 558–562). Beijing: IEEE.

  20. Aranha, D., Castro, R., & Lopez, J. (2008). Efficient certificateless signcryption. In Brazilian symposium on information and computer systems security (pp. 257–258). Brazil.

  21. Canetti, R., Goldreich, O., & Halevi, S. (1998). The random oracle methodology, revisited. In Proceedings of the 30th annual ACM symposium on the theory of computing STOC (pp. 209–218). ACM.

  22. Liu, Z., Hu, Y., Zhang, X., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.

    Article  Google Scholar 

  23. Weng, J., Yao, G., Deng, R. H., Chen, M. R., & Li, X. (2011). Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 181(3), 661–667.

    Article  Google Scholar 

  24. Miao, S., Zhang, F., Li, S., & Mu, Y. (2013). On security of a certificateless signcryption scheme. Information Sciences, 232(20), 475–481.

    Article  Google Scholar 

  25. Jin, Z., Wen, Q., & Zhang. H. (2010). A supplement to Liu et al.s certificateless signcryption scheme in the standard model. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2010/252.

  26. Xiong, H. (2014). Toward certificateless signcryption scheme without random oracles. IACR Cryptology ePrint Archive, 162(1), 1–13.

    Google Scholar 

  27. Mambo, M., & Okamoto, E. (1997). Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E80–A(1), 54–63.

    Google Scholar 

  28. Green, M., & Ateniese, G. (2007). Identity-based proxy re-encryption. In Proceedings of ACNS 2007, LNCS (Vol. 4521, pp. 288–306). Springer.

  29. Shao, J., & Cao, Z. (2012). Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Information Sciences, 206(1), 83–95.

    Article  Google Scholar 

  30. Liang, K., Liu, J. K., Wong, D. S., & Susilo, W. (2014). An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In Proceedigs of ESORICS 2014, LNCS (Vol. 8712, pp. 257–272). Springer.

  31. Kirtane, V., & Rangan, C. P. (2008). RSA-TBOS signcryption with proxy re-encryption. In Proceedings of DRM08 (pp. 59–66). New York: ACM.

  32. Malone-Lee, J., & Mao, W. (2003). Two birds one stone: signcryption using RSA. In Proceedings of CT-RSA 2003, LNCS (Vol. 2612, pp. 211–226).

  33. Chandrasekar, S., Ambika, K., & Rangan, C. P. (2008). Signcryption with proxy re-encryption. In Cryptology ePrint Archive, Report. https://eprint.iacr.org/2008/276.

  34. Wang, H., Wang, C., & Cao, H. (2011). ID-based proxy re-signcryption scheme. In Proceedings of CSAE 2011 (pp. 317–321). Shanghai: IEEE.

  35. Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of INFOCOM 2010 (pp. 534–542). Seattle: IEEE

  36. Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. Transactions on Parallel and Distributed Systems, 24(1), 131–143.

    Article  Google Scholar 

  37. Nabeel, M., Shang, N., & Bertino, E. (2013). Privacy preserving policy-based content sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 25(11), 2602–2614.

    Article  Google Scholar 

  38. Yang, K., & Jia, X. (2014). Expressive, efficient, and revocable data access control for multiauthority cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25(7), 1735–1744.

    Article  Google Scholar 

  39. Hur, J. (2013). Improving security and efficiency in attribute-based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271–2282.

    Article  Google Scholar 

  40. Lai, J., Deng, R. H., Guan, C., & Weng, J. (2013). Attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 8(8), 1343–1354.

    Article  Google Scholar 

  41. Li, J., Huang, X., Li, J., Chen, X., & Xiang, Y. (2014). Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems, 25(8), 2201–2210.

    Article  Google Scholar 

  42. Boyen, X. (2003). Multipurpose identity-based signcryption. A Swiss army knife for identity-based cryptography. In Proceedings of CRYPTO 2003, LNCS (Vol. 2729, pp. 383–399). Springer.

  43. Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.

    Article  Google Scholar 

  44. Lynn, B. (2007). PBC library. https://crypto.stanford.edu/pbc/. Accessed 6 June 2018.

  45. Shim, K. (2012). CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. Trans Vehicular Technology, 61(4), 1874–1883.

    Article  Google Scholar 

  46. Shabisha, P., Braeken, A., Touhafi, A., & Steenhaut, K. (2019). Elliptic curve Qu-Vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage. In CloudTech 2017, Lecture notes in networks and systems (Vol. 49, pp. 1–18). Springer.

Download references

Acknowledgements

This work is supported by the science and technology programs of SGCC titled application research on improving the reliability guarantee capability of information systems (Grant No. 546803170005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fagen Li.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahene, E., Dai, J., Feng, H. et al. A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid. Telecommun Syst 70, 491–510 (2019). https://doi.org/10.1007/s11235-018-0530-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-018-0530-5

Keywords

Navigation