Abstract
Cloud computing has proven to be applicable in smart grid systems with the help of the cloud-based Internet of things (IoT) technology. In this concept, IoT is deployed as a front-end enabling the acquisition of smart grid-related data and its outsourcing to the cloud for data storage purposes. It is obvious that data storage is a pertinent service in cloud computing. However, its wide adoption is hindered by the concern of having a secure access to data without a breach on confidentiality and authentication. To address this problem, we propose a novel data access control scheme that simultaneously accomplishes confidentiality and authentication for cloud-based smart grid systems. Our scheme can enable the storing of encrypted smart grid-related data in the cloud. When a user prefers to access the data, the data owner issues a delegation command to the cloud for data re-encryption. The cloud is unable to acquire any plaintext information on the data. Only authorized users are capable of decrypting the data. Moreover, the integrity and authentication of data can only be verified by the authorized user. We obtain the data access control scheme by proposing a pairing free certificateless signcryption with proxy re-encryption (CLS-PRE) scheme. We prove that our CLS-PRE scheme has indistinguishability against adaptive chosen ciphertext attack under the gap Diffie–Hellman problem and existential unforgeability against adaptive chosen message attack under elliptic curve discrete logarithm problem in the random oracle model.








Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Singh, J., Pasquier, T., Bacon, J., Ko, H., & Eyers, D. (2016). Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of Things Journal, 3(3), 269–284.
Xu, S., Qian, Y., & Hu, R. Q. (2015). On reliability of smart grid neighborhood area networks. IEEE Access, 3(1), 2352–2365.
Xiao, J., Zu, G., Gong, X., & Li, F. (2017). Observation of security region boundary for smart distribution grid. IEEE Transactions on Smart Grid, 8(4), 1731–1738.
Jiang, L., Xu, L. D., Cai, H., Jiang, Z., Bu, F., & Xu, B. (2014). An IoT-oriented data storage framework in cloud computing platform. IEEE Transactions on Industrial Informatics, 10(2), 1443–1451.
Morello, R., De Capua, C., Fulco, G., & Mukhopadhyay, S. C. (2017). A smart power meter to monitor energy flow in smart grids: The role of advanced sensing and IoT in the electric grid of the future. IEEE Sensors Journal, 17(23), 7828–7837.
Li, Y., Cheng, X., Cao, Y., Wang, D., & Yang, L. (2018). Smart choice for the smart grid: Narrowband Internet of Things (NB-IoT). IEEE Internet of Things Journal, 5(3), 1505–1515.
Tian, X., Wang, X., & Zhou, A. (2009). DSP re-encryption: a flexible mechanism for access control enforcement management in DaaS. In Proceeding of CLOUD (pp. 25–32). Bangalore: IEEE.
Liu, Q., Tan, C. C., Wu, J., & Wang, G. (2011) Reliable re-encryption in unreliable clouds. In Proceedings of GLOBECOM (pp. 1–5). Houston: IEEE.
Park, N. (2011). Secure data access control scheme using type-based re-encryption in cloud environment. In Proceedings of semantic methods for knowledge management and communication, SCI (Vol. 381, pp. 319–327). Springer.
Khan, A. N., Kiah, M. L. M., Madani, S. A., Ali, M., Khan, A. U. R., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651.
Li, F., Liu, B., & Hong, J. (2017). An efficient signcryption for data access control in cloud computing. Computing, 99(5), 465–479.
Le, X. H., Lee, S., Butun, I., Khalid, M., Sankar, R., Kim, M., et al. (2009). An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Journal of Communications and Networks, 11(6), 599–606.
Malone-Lee, J. (2002). Identity-based signcryption. Cryptology ePrint Archive, Report 2002/098. https://eprint.iacr.org/2002/098.
Wang, C., & Cao, X. (2011). An improved signcryption with proxy re-encryption and its application. In Proceedings of CIS 2011 (pp. 886–890). Hainan: IEEE.
Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In ACM symposium on information, computer and communications security-ASIACCS 2008 (pp. 369–372). Japan: Tokyo.
Anyembe, A. O., Niyifasha, R., & Li, F. (2016). A provably-secure transmission scheme for wireless body area networks. Journal of Medical Systems, 40(11), 247–261.
Chen, L., & Malone-Lee, J. (2005). Improved identity-based signcryption. In 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland (pp. 362–379). Springer.
Wu, C., & Chen, Z. X. (2008). A new efficient certificateless signcryption scheme. In Proceedings of IEEE international symposium on information science and engineering, ISISE 2008 (Vol. 1, pp. 661–664). Shanghai: IEEE.
Xie, W., & Zhang, Z. (2010). Efficient and provably secure certificateless signcryption from bilinear maps. In Proceedings of IEEE international conference on wireless communications, networking and information security, WCNIS 2010 (pp. 558–562). Beijing: IEEE.
Aranha, D., Castro, R., & Lopez, J. (2008). Efficient certificateless signcryption. In Brazilian symposium on information and computer systems security (pp. 257–258). Brazil.
Canetti, R., Goldreich, O., & Halevi, S. (1998). The random oracle methodology, revisited. In Proceedings of the 30th annual ACM symposium on the theory of computing STOC (pp. 209–218). ACM.
Liu, Z., Hu, Y., Zhang, X., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.
Weng, J., Yao, G., Deng, R. H., Chen, M. R., & Li, X. (2011). Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 181(3), 661–667.
Miao, S., Zhang, F., Li, S., & Mu, Y. (2013). On security of a certificateless signcryption scheme. Information Sciences, 232(20), 475–481.
Jin, Z., Wen, Q., & Zhang. H. (2010). A supplement to Liu et al.s certificateless signcryption scheme in the standard model. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2010/252.
Xiong, H. (2014). Toward certificateless signcryption scheme without random oracles. IACR Cryptology ePrint Archive, 162(1), 1–13.
Mambo, M., & Okamoto, E. (1997). Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E80–A(1), 54–63.
Green, M., & Ateniese, G. (2007). Identity-based proxy re-encryption. In Proceedings of ACNS 2007, LNCS (Vol. 4521, pp. 288–306). Springer.
Shao, J., & Cao, Z. (2012). Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Information Sciences, 206(1), 83–95.
Liang, K., Liu, J. K., Wong, D. S., & Susilo, W. (2014). An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In Proceedigs of ESORICS 2014, LNCS (Vol. 8712, pp. 257–272). Springer.
Kirtane, V., & Rangan, C. P. (2008). RSA-TBOS signcryption with proxy re-encryption. In Proceedings of DRM08 (pp. 59–66). New York: ACM.
Malone-Lee, J., & Mao, W. (2003). Two birds one stone: signcryption using RSA. In Proceedings of CT-RSA 2003, LNCS (Vol. 2612, pp. 211–226).
Chandrasekar, S., Ambika, K., & Rangan, C. P. (2008). Signcryption with proxy re-encryption. In Cryptology ePrint Archive, Report. https://eprint.iacr.org/2008/276.
Wang, H., Wang, C., & Cao, H. (2011). ID-based proxy re-signcryption scheme. In Proceedings of CSAE 2011 (pp. 317–321). Shanghai: IEEE.
Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of INFOCOM 2010 (pp. 534–542). Seattle: IEEE
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. Transactions on Parallel and Distributed Systems, 24(1), 131–143.
Nabeel, M., Shang, N., & Bertino, E. (2013). Privacy preserving policy-based content sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 25(11), 2602–2614.
Yang, K., & Jia, X. (2014). Expressive, efficient, and revocable data access control for multiauthority cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25(7), 1735–1744.
Hur, J. (2013). Improving security and efficiency in attribute-based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271–2282.
Lai, J., Deng, R. H., Guan, C., & Weng, J. (2013). Attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 8(8), 1343–1354.
Li, J., Huang, X., Li, J., Chen, X., & Xiang, Y. (2014). Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems, 25(8), 2201–2210.
Boyen, X. (2003). Multipurpose identity-based signcryption. A Swiss army knife for identity-based cryptography. In Proceedings of CRYPTO 2003, LNCS (Vol. 2729, pp. 383–399). Springer.
Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.
Lynn, B. (2007). PBC library. https://crypto.stanford.edu/pbc/. Accessed 6 June 2018.
Shim, K. (2012). CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. Trans Vehicular Technology, 61(4), 1874–1883.
Shabisha, P., Braeken, A., Touhafi, A., & Steenhaut, K. (2019). Elliptic curve Qu-Vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage. In CloudTech 2017, Lecture notes in networks and systems (Vol. 49, pp. 1–18). Springer.
Acknowledgements
This work is supported by the science and technology programs of SGCC titled application research on improving the reliability guarantee capability of information systems (Grant No. 546803170005).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Rights and permissions
About this article
Cite this article
Ahene, E., Dai, J., Feng, H. et al. A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid. Telecommun Syst 70, 491–510 (2019). https://doi.org/10.1007/s11235-018-0530-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-018-0530-5