Abstract
Privacy preserved outsourced data access control is a hard task under the control of thirdâparty storage server. To overcome obstacles in the third party based scenario, Attribute-based signcryption system with bilinear pairing tool is one of the most suitable methods in cloud. It maintains the basic features of security like, authenticity, confidentiality, public verifiability, owner privacy, etc. Although, this method has some challenges like a centralized authority used for user secret key generation for de-signcryption operation, and lack in competent attribute revocation. To overcome the issues, we have proposed a scheme of attribute revocable privacy preserved outsourced based data access control mechanism using Attribute-based signcryption. The proposed method allows multi-authorities for assigning both attribute and secret keys for users along with trusted certified authority, which provides security parameters. The analysis of the proposed method shows less computation cost in decryption and authentication verification. The almost same performance and efficiency is found while comparing with the existing schemes after adding new features.
Keywords

Introduction
Data outsourcing is a viable option for storing huge organizational data persistently. Cloud data outsourcing relieves the data owner from setting up of their own storage server, network, and other infrastructures. The organization is allowed to request data storage from the cloud according to their present requirement and thereby minimize storage cost. The cloud data outsourcing also facilitates the growing need for data storage requirement as the organization scales up its operations [1]. In spite of the several benefits of cloud data outsourcing, many organizations are wary of outsourcing their organizational data into the cloud. This is due to the fact that the security of outsourced data is handled by the third-party cloud administrator [2]. The security concern of data owners for outsourcing data in the cloud may be reduced by putting in place, proper access control policy from the data owners’ side. Outsourcing of sensitive data, such as finance, defence, health records etc., to the third party cloud server arise privacy issue along with data security [3]. It is necessary to have a robust and reliable procedure which offers data confidentiality, authenticity, public verifiability, etc. without negotiating the data owner privacy for secured outsourced data access control. Recently, some researchers have explored the possibility of privacy preserved access control schemes [4, 5] to protect the stored data in cloud.
To overcome above issues of security and privacy in cloud, Attribute-Based Signature (ABS) [6] and Attribute-Based Encryption (ABE) [7] are the most promising security tools due to scalable and reliable features. ABS provides an opportunity to digitally sign a message without disclosing the identity of a signer and ABE provides the facility to develop an access control on encrypted data with message confidentiality. It is mentioned that Attribute-Based Signcryption (ABSC) [8], a logical combination of ABE and ABS, has a significant scope [3] to design privacy preserved outsourced data access control. There are several numbers of ABE and ABS schemes available based on structural view (Ciphertext policy based ABE, Key Policy based ABE), security assumptions (CDHE, DBHE, Sub-group), decentralized property, used policy structures, etc. explained in [2]. However, a few numbers of signcryption schemes explored till now which can provide authenticity and confidentiality under a single scheme using several feature alike attribute based encryption. We have prepared here a comparative study of signcryption schemes which are more suitable to design Outsourced data access control under third party storage server. At first, signcryption scheme addressed by Zheng et al. [8] combing of encryption and signature scheme together where the attribute-based concept was not present. The signcryption schemes addressed in [9, 10, 11, 12, 19] using the attribute-based process and those schemes are known as ABSC. It has an ability of public verifiability where any intermediate parties able to verify the validity of a message (even encrypted) without knowledge of user secret key and underlying content.
The problem of designing a multi-authority data access control scheme based on CP-ABSC with de-signcryption outsourcing capabilities and attribute revocation for cloud data outsourcing has received very little attention so far, although some schemes based on Multi-Authority ABE and ABS for cloud storage setting have been proposed, as in [4, 5, 10, 12]. Since the verification and decryption both have to be performed on the user side cloud data outsourcing, the number of pairing operations evaluated on the user side is proportional to the sum of the required attributes, i.e. not much acceptable for data outsourcing. In this article, we have proposed an efficient scheme extending the scheme of Rao et al. [4] with multi-authority set-up, outsource de-signcryption and attribute revocation. Our main contributions are as follows.
We propose a privacy preserved access control scheme for data outsourcing in cloud based on extension of Rao et al. [4] scheme. The proposed scheme supports computation outsourcing, multi authority setup and attribute revocation to make the system as reliable and efficient. We analyze security of the proposed scheme to show that is achieves the remarkable security and privacy requirements. We present the performance of competent existing attribute-based signcryption schemes with the proposed scheme based on the size of signing key, encryption key, cipher-text and signcryption and de-signcryption on the basis of computation cost as well.
The organization of this article followed by Section 2 as literature survey. In Section 3, we have explained the system description with system framework, security requirement with security notion, etc. The details construction of proposed privacy preserved secured data access control in Section 5. Security analysis of the proposed system is discussed in Section 6. Section 7 represents a comparative analysis of performance and functionalities of the proposed scheme. The summary of the paper explained in Section 8.
Comparison on features of several existing ABSC scheme
Comparison on features of several existing ABSC scheme
CP: Cipher-text Policy; KP: Key Policy; SCP: Signcryption-Policy; MSP: Monotone Spam Program; TP: Threshold Policy; d(Hm)BDHE: decisional (hashed modified) bilinear Diffie-Hellman Exponent; c(m)DHE: computational (modified) Diffie-Hellman Exponent.
In 2010, Gagne et al. [11] initiated a formal study of an attribute-based signcryption scheme with threshold policies extending the concept of Zheng et al. [8]. They used Fuzzy identity-based encryption for encryption and threshold ABS for a signature scheme and also shown secured under selective predicate model. Later on, Emura et al. [12] explained a dynamic attribute-based singcryption with monotone access structure policy for the sender. This system supports AND-gate wildcard for a receiver and secured under the selective model. However, both models did not support signer privacy and unforgeability properties. Wang et al. [13] discussed a scheme in signcryption-policy based on monotone access tree. The functionality such as confidentiality and unforgeability were proven in adaptive-predicates models for this scheme. The unforgeability was proven by the random oracle model and confidentiality was proven by a generic group model, where the de-signcrypt mechanism is inaccessible to the adversary. A combined public-key scheme in attribute-based setting proposed by Chen et al. [14] where they used Water’s [7] CP-ABE scheme and Maji’s [6] ABS scheme to construct identical public parameters and key distribution. Chen et al. [14] used selectively joint security model in their combined scheme. Security assumption for this scheme is a monotone span program for both signer and receiver policy. In this scheme, the authors proved public verifiability and signer privacy as well as confidentiality and unforgeability under selective-predicate models. Wei et al. [10] proposed a traceable attribute-based signcryption scheme. They assumed as security parameters the decisional BDHE for signing and computational DHE for encryption. It provides confidentiality, and unforgeability under selectively predicate models. However, the property of signer privacy does not maintain by the scheme. Pandit et al. [9] addressed an attribute-based signcryption which supports confidentiality, signer privacy, strong unforgeability, etc. This scheme is selectively secured under adaptive-predicates security model. In 2015, Liu et al. [5] addressed a scheme named as CP-ABSC, a method based on Water’s CP-ABE [7] and Maji’s ABS [6]. They claimed that their scheme satisfies the message confidentiality against of distinguishable cipher-texts under adaptive chosen cipher-text attack. However, their structures are not supported by any of the standard signcryption techniques such as a logical mixture of signing and encryption, Sign-then-Encrypt (StE) and Encrypt-then-Sign. Moreover, it is not supported public verifiability as per their claimed. In 2017, Rao et al. [4] showed a scheme based on key policy maintaining the constant cipher-text encryption. They used MSP for both sender and receiver policy structure. Their scheme maintained signer privacy, confidentiality and also unforgeability which were proven by selective-predicate models. However, this scheme was a centralized system where all attributes for signing and encryption managed by a single authority. Moreover, this scheme did not provide sufficient attribute revocation process.
In Table 1, we have shown the comparison of several Attribute Based Signcryption schemes with the used functionality and characteristics. As prior characteristics, we have considered the security assumption or the hard problem based on which the data access control scheme need to implemented, encryption policy structure, signing policy structure, multi-authority setup, attribute revocation, computation outsourcing, signer privacy, public verifiability, security proof like confidentiality, Unforgeability, etc. The attribute based signcryption scheme in [4] is not supported multi authority setup along with attribute revocation but they have proven that their scheme is more efficient with respect to computation cost compare to other approaches in the table. There is a lack of reliability in terms of access revocation among existing and newly added users.
Bilinear pairings
(Bilinear Pairings).
Let
Non-degenerate: Computable: Efficient procedure to compute
We represent the bilinear pairing parameters shortly as
We have used q-PDBDHE [3] for security assumption of our scheme as follows.
Let a group
then, it is very hard to differentiate
(q-PDBDHE).
The q-PDBDHE assumption holds if no such polynomial time methodology has non-negligible gain to solve the q-PDBDHE problem.
(Access Structures [15]).
Let
In addition, an access structure
Linear secret-sharing scheme
(LSSS [15]).
Let
Distribute
Reconstruct
The objective vector
Ciphertext Policy-Attribute Based Signcryption (CP-ABSC)
It is contained with the following subsequent algorithms:
In brief,
.
Following [4, 14], we have defined here the security requirement of CP-ABSC scheme, which includes data confidentiality, signcryptor privacy, cipher-text unforgeability. IND-sEP-CCA2 and EUF-sSP-CMA security model is used to define the security notation of data confidentiality and unforgeability respectively. EUF-sSP-CMA denotes selective signing policy and adaptive chosen message attack and IND-sEP-CCA2 as in-distinguishability of cipher-texts under selective encryption policy and adaptive chosen cipher-text attack.
Data confidentiality
Data confidentiality of a cryptographic scheme is able to visualised as playing a game between an Adversary
Secretkey oracle Signcryption oracle De-signcryption oracle
Finally, the advantage of
.
The scheme
Cipher-text Unforgeability of a cryptographic scheme can be finalized by playing a game in between an Adversary
SecretKey oracle Signcryption oracle De-signcryption oracle
The advantage of
.
The
It ensures that one cannot guess from a signed message, the used set of attributes of a signer. This security notion is formally defined by a game between
.
The CP-ABSC scheme
Based on Attribute Based Signcryption, we have proposed Signcryption based Outsourced Data Access Control (SBODAC), an efficient data access control scheme for outsourced data in cloud. We have minimized cost of de-signcryption operation with computation outsourcing and introduced attribute revocation to manage dynamic users.
Scheme description
System architecture.
We have shown the working process of our proposed model in Fig. 1 consisting of five different types of entities, viz, the global trusted certify authority (TCA) to generate common parameters for the other entities, cloud server to store the signcrypted data, multiple key distribution centers (KDCs) as attribute authority to generate the keys for signing and decryption keys for each of the user. In this system, TCA registers all the KDCs and users (signcryptors and de-signcryptors). Each attributes authority as a KDC assigns attribute public keys corresponding to users, who are associated with those attributes. The signcryptor encrypts the data using signing and encryption key and store into the cloud. Finally, the de-signcryptors verify the signature to access data from the cloud and if they succeed, then based on decryption key decrypt the cipher-text using partially decryption outsourcing. A corrupted user or a KDC administrator with others is not able to e-signcrypt the correct message from this system. Each KDC initiates the cipher-text update without hampering the data signer by attribute revocation process. The communications among TCA, KDCs, users and cloud server performed by secure shell (SSH) protocol. The detailed functionality of each entity is shown in the Table 2.
Descriptions of involved entities
We have shown the whole working process of our proposed scheme in Fig. 2 for more clarity.
Workflow of the proposed scheme.
Let TCA be fully trusted and key distribution centers will provide the correct user secret key on query. The cloud server is semi-trusted but will provide cipher-text on demand. The key distribution center should not collude with the user to access data. However, it can be corrupted for the user information to provide an adversary. A user or attacker can be corrupted and collude each other (even cloud server) with user information for signing or decrypt.
Confidentiality: Unauthorized users should be prevented from access to original data. The user who has no sufficient attributes which are listed at signcryption time is known as unauthorized user. Data Owner Privacy: The owner who has sensitive information to share with specific persons without disclosing his identity. Owner identity must be protected from the storage server and other users. Public verifiability: The data owner who is signcrypted the data should be valid user and also publicly verifiable. Unforgeability: A user who does not have the privilege to signcrypt the data need to prevent to signcrypt any data. Forward and Backward Security: A newly joined user should able to access the system properly. The revoked user should prevent to access the system. Collision Resistance: A group of authorized users inside the system combining their secret must not retrieve an another user’s secret.
We have described few multiple used declaration in the Table 3 for our proposed Scheme. Mostly single used declarations are defined in place of location.
Notations for our scheme description
Notations for our scheme description
The system framework is consisting of the following algorithms in brief:
To develop our proposed scheme, we have used similar analytical model of Rao et al. [4] where ABSC model used to develop a case study on Physical Health Records. However, this scheme is a centralized system, where a single trusted authority issues all the secret keys for signing and encryption. For our proposed scheme, we have made it decentralized mode based on Chease et al. [17]. We have used large universe attribute based encryption process as [15]. To incorporate the revocation method, we have used Green et al. [18] revocation scheme. We have also incorporated outsourcing operation for de-signcryption operation to reduce to computation cost for data users. The details construction of our proposed scheme explained using the following phases.
It selects For each attribute It registers all the users and key distribution center providing unique user identity For each user, it also chooses randomly two values
Finally, it publishes the public parameter as
Each KDC sends
where,
User signing secret key
User decryption secret key
Since Similarly, it considers an another vector The signer re-randomizes the signing key by choosing randomly Now, it randomly picks
Finally, the cipher-text is
Now, the data owner uploads the data file
At first, the algorithm checks the current time It chooses It computes Now validity of the cipher-text
Here,
As Recover
where
At last, the valid user can retrieve the correct message as
The
Or update their encryption secret key as
If the encryption attribute is revoked, the cloud server recalculates the cipher-text component as
where
We are considering the whole de-signcryption process to check the system correctness. If
We have
Considering the a component
where
We can compute from cipher text component in Eq. (24)
Now, Eq. (25) is
To show the correctness of the decryption, we demonstrate as follows. For
The Eq. (26) can be derived as
Therefore, the final message from Eq. (24),
In this section, the security proof of the proposed scheme is being analysed. The involved security features of our scheme are message confidentiality, data owner privacy, cipher-text unforgeability, collision resistance, forward security, backward security, etc.
Message confidentiality
.
If the security of Rao’s [4] is secure than our proposed scheme is secured as we have the same security properties.
Proof..
If
Secretkey oracle
and return back to Signcryption oracle The generated cipher-text in Eq. (24)
De-signcryption oracle
and the decryption done through Eq. (26) as
and using Eq. (27)
Finally, the advantage of
Therefore, the confidentiality of message is ensured in the proposed scheme. ∎
.
We say that the CP-ABSC scheme
Proof..
In initial phase
In Setup phase
Secretkey oracle
and return back to Signcryption oracle
De-signcryption oracle
and the decryption done through Eq. (26)
and using Eq. (27)
The advantage
.
Our scheme ensures the data owner’s privacy.
Proof..
A Challenger
and ask to Adversary
Collusion resistance
We consider two random elements
.
The proposed SBODAC is collusion resistant.
Proof..
It is guaranteed that any adversaries or cloud server with the other users combining their information cannot sign a message unauthorized way. If an adversary builds a forgery sign to break the proposed system, the adversaries are also able to break the q-PBDHE assumption mention in theorem 3.2. Therefore, the colluding users with the cloud server cannot sign any data as well as decrypt any ciphertext. ∎
Revocation security
In the proposed system, the revocation process has done based on the update of user secret keys and signcrypted text in both cases signature and encryption process. If any attribute revoked from a user, corresponding KDC center will take initiative to update of user secret keys as
.
Our SBODAC scheme provides the backward and forward revocation security.
Proof..
Backward Security: As the attribute version key changed from the public key of KDC
Similarly, for decryption the required cipher-text also updated to
Forward Security: After attribute revocation cipher text is updated as
The newly joined user easily sign the plain-text here as he gets updated version key-based secret key generated by the corresponding KDC
Performance analysis
We compare our proposed scheme with competent existence approaches under various features. The computation cost, communication cost, revocation cost are analysed and simulated.
Analysis of characteristics
Although many existing schemes on cloud data storage [4, 9, 5, 14, 16], only ABSC based schemes are analysed with the features like, multi-authority setup, collision resistance, large universe properties, confidentiality, privacy, attribute re-vocation, and computing outsourcing.
Comparison on characteristics with our scheme
Comparison on characteristics with our scheme
In Table 4, the capability to succeed the corresponding index denoted by
Computation and communication cost are other necessary parameter due to limited resources. Necessary for a security scheme to compute the performance with respect to computation and communication cost due to limited computation resources. We numerically analysis the performance of our proposed scheme based on secret signing and decryption key size, signcryption and de-signcryption process from the user site. Another analysis, Revocation cost is calculated which is missing in other listed schemes. The list of notations used in this sub section is given Table 5.
Notations for performance analysis
Notations for performance analysis
There are a number of schemes already existing for attribute-based signcryption. Transmission and communication cost need to be measured for each of the schemes for identifying the efficiency of the scheme. The consideration of ABSC scheme for outsourced cloud data access control required to satisfy some functionality which might not hold all the existing schemes, that can be possible to ensure form characteristic analysis and performance analysis. In this section, we analyze different parameters of existing attribute-based signcryption mechanism to evaluate the performance and compare with our proposed scheme.
Storage overhead for secret key and cipher-text
Table 6 shows the storage overhead incurred by each user to store the user secret key. Similarly, the generated cipher-text which supposed to store in the cloud also calculated in this table. The computation of storage requirements is similar to the previous schemes.
In Table 7 we explained about computation cost of signcryption and de-signcryption algorithms for competent similar existing approaches. As the de-signcryption operation computed partially by outsourcing into the cloud, therefore this operation divided into two parts. The first part is outsourced de-signcryption and the second part is user de-signcryption. To compute the computation cost of signcryption and de-signcryption, we have considered the number of exponential operations and pairing operation used in the algorithm.
Communication cost
To revoke an attribute, the KDC incurs storage overhead related to revoked attributes in our scheme. Associate KDC of revoked attribute changes the version key of the revoked attribute and generates the update key component for non-revoked user. Similarly, for the corresponding cipher-text components (such as if revoked attribute from the signature then signature component or if revoked attribute from the encryption component then encryption component) need to change associate KDC. The associated KDC generates update cipher text component for the cloud server. This process incurs very less storage overhead on the associated KDC, non-revoked signer user, non-revoked decryption user and cloud server.
Simulation
We simulated the proposed SBODAC scheme using Pairing-based Cryptography (PBC) library version 0.5.14 and GMP 5.1.6 linked with Charm tools [20]. The system is Ubuntu 16.04 LTS, 4GB RAM and 2.6 GHz processor clock speed. To consider an elliptic curve group, we used
Comparison of our scheme with competent schemes.
In Fig. 3 shows the graph representation of computation time for the two important operation that signcryption and de-signcryption. In the Fig. 3a shows that our proposed scheme perform well for the signcryption operation compare to the schemes in [14, 5, 9, 16]. However, our proposed scheme takes more computation cost compare to the scheme [4]. This is happened due to multi-authority setup and attribute revocation properties which are not available in [4].
In Fig. 3b shows our proposed scheme incurs very nominal cost due to use of computation outsourcing. Due to the properties of computation outsourcing, our scheme and [16] are providing same result whereas other schemes in [14, 5, 9] shown more computation cost.
In a third-party storage server providing privacy preserved outsourced data access control is a promising need for developing more trust on Cloud Computing. We proposed SBODAC scheme to securely outsourcing data in the cloud, where both owner privacy and data security are considered together. Anonymous user is able to authenticate themselves without disclosing their identity to store data in the cloud and also possible to control that data access among the authorized users. The proposed scheme provides data confidentiality, signer privacy, and public verification and attribute revocation together with a strong cryptographic guarantee. The proposed work is also able to apply with data owner privacy and security development in recent technologies like, frog computing, IoT security, grid computing, big data security, social network security etc. It will also be prominent to use under lightweight devices by the decryptor due to use of computation outsourcing in de-signcryption operation.
Footnotes
Author’s Bios
