A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain

Cloud computing is a powerful technology because it provides users with attractive online files sharing services. However, security and privacy are significant challenges since the cloud cannot be fully trusted due the traditional centralized management system. This paper proposes a certificateless proxy re-encryption as an efficient mechanism to secure access over outsourced data. The proposed scheme relies on blockchain technology for decentralized security administration and data protection. Besides, the scheme achieves data confidentiality and efficient revocation mechanism. Moreover, the security analysis proves the confidentiality and integrity of the data stored in the cloud server. Finally, we evaluate the performance of the proposed scheme.

[1]  Abdellah Ait Ouahman,et al.  Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT , 2017 .

[2]  Alvaro A. Cárdenas,et al.  Towards a secure and interoperable DRM architecture , 2006, DRM '06.

[3]  Xinwen Zhang,et al.  CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud , 2012, ASIACCS '12.

[4]  Changyu Dong,et al.  Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing , 2017, CCS.

[5]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[6]  Michael Siegel,et al.  An IoT Integrity-First Communication Protocol via an Ethereum Blockchain Light Client , 2019, 2019 IEEE/ACM 1st International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT).

[7]  Hui Li,et al.  Short-ciphertext and BDH-based CCA2 secure certificateless encryption , 2010, Science China Information Sciences.

[8]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[9]  Fagen Li,et al.  A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment , 2017, EIDWT.

[10]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[11]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[12]  Cheng Chen,et al.  Towards a Secure Certificateless Proxy Re-Encryption Scheme , 2013, ProvSec.

[13]  Pieter H. Hartel,et al.  A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare , 2008, Secure Data Management.

[14]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[15]  Huanshui Zhang,et al.  Consensus problems for discrete-time agents with communication delay , 2017 .

[16]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[17]  Fagen Li,et al.  Efficient certificateless access control for industrial Internet of Things , 2017, Future Gener. Comput. Syst..

[18]  Michael L. Martini,et al.  Emerging Blockchain Technology Solutions for Modern Healthcare Infrastructure , 2019, Journal of Scientific Innovation in Medicine.

[19]  Elisa Bertino,et al.  An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.

[20]  Feng Hao,et al.  A Smart Contract for Boardroom Voting with Maximum Voter Privacy , 2017, IACR Cryptol. ePrint Arch..

[21]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[22]  Anas Abou El Kalam,et al.  FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.

[23]  Luis Rodero-Merino,et al.  A break in the clouds: towards a cloud definition , 2008, CCRV.

[24]  Hu Xiong,et al.  An efficient certificateless public key cryptography with authorized equality test in IIoT , 2020, J. Ambient Intell. Humaniz. Comput..

[25]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[26]  Lin Sun,et al.  An efficient RSA-based certificateless public key encryption scheme , 2017, Discret. Appl. Math..

[27]  Jian Shen,et al.  Bitcoin-based fair payments for outsourcing computations of fog devices , 2018, Future Gener. Comput. Syst..

[28]  Hu Xiong,et al.  Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles , 2019, IEEE Access.