Soft Computing

, Volume 21, Issue 10, pp 2643–2649 | Cite as

Towards secure and cost-effective fuzzy access control in mobile cloud computing

  • Wei Wu
  • Shun Hu
  • Xu Yang
  • Joseph K. Liu
  • Man Ho Au
Methodologies and Application

Abstract

In this article, we suggest a secure and cost-effective fuzzy access control protocol in mobile cloud computing. It is especially designed for small and medium enterprises (SMEs) providing business-to-customers services. Our protocol allows the SME to outsource its services to a cloud to reduce the running cost. At the same time, it does not require any communication between the cloud and the SME during user authentication stage. That is, SME can be offline after users have been registered. Users directly deal with the cloud for gaining access. This helps the SME to save a lot of resources, including a large bandwidth connecting with the cloud and a strong firewall system. Meanwhile, the user database never leaves the SME. In addition, our protocol can withstand common attacks such as dictionary attacks for server and phishing attacks for client. Our security protection is especially important for mobile users as mobile devices are easily exposed to such attacks. Furthermore, our protocol provides user traceability to SME and it is very efficient for mobile devices.

Keywords

Secure Cost-effective Fuzzy access-control Mobile cloud SME B2C 

References

  1. Analytics SP (2013) Mobile cloud platforms: the back end of mobile apps. http://www.reportlinker.com/p01650001-summary/Mobile-Cloud-Platforms-The-Back-end-of-Mobile-Apps.html
  2. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (S&P 2007), 20–23 May 2007, Oakland, IEEE Computer Society, pp 321–334 (2007)Google Scholar
  3. Boneh D, Boyen X (2008) Short signatures without random oracles and the SDH assumption in bilinear groups. J Cryptol 21(2):149–177MathSciNetCrossRefMATHGoogle Scholar
  4. Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319MathSciNetCrossRefMATHGoogle Scholar
  5. Caro AD (2015) The java pairing based cryptography library (jpbc). http://libeccio.dia.unisa.it/projects/jpbc/
  6. Chen X, Li J, Huang X, Li J, Xiang Y, Wong DS (2014) Secure outsourced attribute-based signatures. IEEE Trans Parallel Distrib Syst 25(12):3285–3294CrossRefGoogle Scholar
  7. Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Canetti R, Garay JA (eds) Advances in cryptology—CRYPTO 2013–33rd annual cryptology conference, Santa Barbara, August 18–22, 2013. Proceedings part II. Lecture notes in computer science, vol 8043. Springer, pp 479–499 (2013)Google Scholar
  8. Goldreich O, Goldwasser S, Micali S (1986) How to construct random functions. J ACM 33(4):792–807MathSciNetCrossRefMATHGoogle Scholar
  9. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, di Vimercati SDC (eds) Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, October 30–November 3, 2006. ACM, pp 89–98 (2006)Google Scholar
  10. Hohenberger S, Waters B (2013) Attribute-based encryption with fast decryption. In: Kurosawa K, Hanaoka G (eds) Public-key cryptography—PKC 2013—16th international conference on practice and theory in public-key cryptography, Nara, February 26–March 1, 2013. Proceedings Lecture Notes in Computer Science, vol 7778. Springer, pp 162–179 (2013)Google Scholar
  11. Hohenberger S, Waters B (2014) Online/offline attribute-based encryption. In: Krawczyk H (ed) Public-key cryptography—PKC 2014–17th international conference on practice and theory in public-key cryptography, Buenos Aires, March 26–28, 2014. Proceedings lecture notes in computer science, vol 8383. Springer, pp 293–310 (2014)Google Scholar
  12. Lewko AB, Waters B (2011) Decentralizing attribute-based encryption. In: Paterson KG (2011), pp 568–588Google Scholar
  13. Lewko AB, Waters B (2011) Unbounded HIBE and attribute-based encryption. In: Paterson KG (2011), pp 547–567Google Scholar
  14. Lewko AB, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini R, Canetti R (2012), pp 180–198Google Scholar
  15. Li J, Chen X, Huang X (2015) New attribute-based authentication and its application in anonymous cloud access service. IJWGS 11(1):125–141CrossRefGoogle Scholar
  16. Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRefGoogle Scholar
  17. Liu Z, Weng J, Li J, Yang J, Fu C, Jia C (2015) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Computi, pp 1–13Google Scholar
  18. Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Kiayias A (ed) Topics in cryptology—CT-RSA 2011–the cryptographers’ track at the RSA conference 2011, San Francisco, February 14–18, 2011. Proceedings Lecture Notes in Computer Science, vol 6558. Springer, pp 376–392Google Scholar
  19. Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Ning P, di Vimercati SDC, Syverson PF (eds) Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, October 28–31, 2007. ACM, pp. 195–203 (2007)Google Scholar
  20. Paterson KG (ed) Advances in cryptology—EUROCRYPT 2011–30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, May 15–19, 2011. Proceedings lecture notes in computer science, vol 6632. Springer (2011)Google Scholar
  21. Pirretti M, Traynor P, McDaniel P, Waters B (2010) Secure attribute-based systems. J Comput Secur 18(5):799–837CrossRefGoogle Scholar
  22. Rouselakis Y, Waters B (2013) Practical constructions and new proof methods for large universe attribute-based encryption. In: Sadeghi A, Gligor VD, Yung M (eds) 2013 ACM SIGSAC conference on computer and communications security, CCS’13, Berlin, November 4–8, 2013. ACM, pp 463–474 (2013)Google Scholar
  23. Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Böhme R, Okamoto T (eds) Financial Cryptography and Data Security–19th International Conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015, Revised selected papers. Lecture notes in computer science, vol 8975. Springer, pp 315–332 (2015)Google Scholar
  24. Safavi-Naini R, Canetti R (eds) (2012) Advances in Cryptology—CRYPTO 2012–32nd annual cryptology conference, Santa Barbara, August 19–23, 2012. Proceedings lecture notes in computer science, vol 7417. SpringerGoogle Scholar
  25. Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini R, Canetti R (2012), pp 199–217Google Scholar
  26. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT 2005, 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, May 22–26, 2005, Proceedings lecture notes in computer science, vol 3494. Springer, pp 457–473Google Scholar
  27. Schnorr C (1989) Efficient identification and signatures for smart cards. In: Brassard G (ed) Advances in cryptology—CRYPTO ’89, 9th annual international cryptology conference, Santa Barbara, August 20–24, 1989, Proceedings lecture notes in computer science, vol 435. Springer, pp 239–252Google Scholar
  28. Vaudenay S (2005) A classical introduction to cryptography: applications for communications security. SpringerGoogle Scholar
  29. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) Public key cryptography—PKC 2011–14th international conference on practice and theory in public key cryptography, Taormina, March 6–9, 2011. Proceedings lecture notes in computer science, vol 6571. Springer, pp 53–70Google Scholar
  30. Wei J, Huang X, Hu X, Liu W (2015) Revocable threshold attribute-based signature against signing key exposure. In: Lopez J, Wu Y (eds) Information security practice and experience–11th international conference, ISPEC 2015, Beijing, May 5–8, 2015. Proceedings lecture notes in computer science, vol 9065. Springer, pp 316–330Google Scholar
  31. Wu Z, Liang B, You L, Jian Z, Li J (2015) High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput, pp 1–12Google Scholar
  32. Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  • Wei Wu
    • 1
    • 2
  • Shun Hu
    • 3
  • Xu Yang
    • 1
    • 2
  • Joseph K. Liu
    • 4
  • Man Ho Au
    • 5
  1. 1.Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina
  2. 2.State Key Laboratory of Integrated Service Networks (ISN)Xidian UniversityXi’anPeople’s Republic of China
  3. 3.College of Information Science and TechnologyJinan UniversityGuangzhouPeople’s Republic of China
  4. 4.Faculty of Information TechnologyMonash UniversityMelbourneAustralia
  5. 5.Hong Kong Polytechnic UniversityHong KongHong Kong

Personalised recommendations