{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T22:35:52Z","timestamp":1717022152886},"reference-count":42,"publisher":"Wiley","issue":"15","license":[{"start":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T00:00:00Z","timestamp":1565913600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2019,10]]},"abstract":"Summary<\/jats:title>Cloud storage services require cost\u2010effective, scalable, and self\u2010managed secure data management functionality. Public cloud storage always enforces users to adopt the restricted generic security consideration provided by the cloud service provider. On the contrary, private cloud storage gives users the opportunity to configure a self\u2010managed and controlled authenticated data security model to control the accessing and sharing of data in a private cloud. However, this introduces several new challenges to data security. One critical issue is how to enable a secure, authenticated data storage model for data access with controlled data accessibility. In this paper, we propose an authenticated controlled data access and sharing scheme called ACDAS to address this issue. In our proposed scheme, we employ a biometric\u2010based authentication model for secure access to data storage and sharing. To provide flexible data sharing under the control of a data owner, we propose a variant of a proxy reencryption scheme where the cloud server uses a proxy reencryption key and the data owner generates a credential token during decryption to control the accessibility of the users. The security analysis shows that our proposed scheme is resistant to various attacks, including a stolen verifier attack, a replay attack, a password guessing attack, and a stolen mobile device attack. Further, our proposed scheme satisfies the considered security requirements of a data storage and sharing system. The experimental results demonstrate that ACDAS can achieve the security goals together with the practical efficiency of storage, computation, and communication compared with other related schemes.<\/jats:p>","DOI":"10.1002\/dac.4072","type":"journal-article","created":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T12:05:08Z","timestamp":1565957108000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["ACDAS: Authenticated controlled data access and sharing scheme for cloud storage"],"prefix":"10.1002","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2105-6578","authenticated-orcid":false,"given":"Deepnarayan","family":"Tiwari","sequence":"first","affiliation":[{"name":"Institute for Development and Research in Banking Technology (IDRBT) Hyderabad India"},{"name":"School of Computer and Information Sciences University of Hyderabad Hyderabad India"}]},{"given":"Gayatri K","family":"Chaturvedi","sequence":"additional","affiliation":[{"name":"Matoshri Aasarabai Polytechnic Nashik India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0764-2650","authenticated-orcid":false,"given":"G. R.","family":"Gangadharan","sequence":"additional","affiliation":[{"name":"National Institute of Technology Tiruchirappalli India"}]}],"member":"311","published-online":{"date-parts":[[2019,8,16]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.203"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2448095"},{"key":"e_1_2_11_5_1","doi-asserted-by":"crossref","unstructured":"GreenM AtenieseG.Identity\u2010based proxy re\u2010encryption. In: Proceedings of the 5th international conference on Applied Cryptography and Network Security (ACNS \u201907);2007;Zhuhai China:288\u2010306.","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2104470"},{"key":"e_1_2_11_7_1","doi-asserted-by":"crossref","unstructured":"WangC QinZhi\u2010guang PengJ WangJ.A novel encryption scheme for data deduplication system. In: 2010 International Conference on Communications Circuits and Systems (ICCCAS);2010;Chengdu China:265\u2010269.","DOI":"10.1109\/ICCCAS.2010.5581996"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2506573"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.09.004"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38586-5_2"},{"key":"e_1_2_11_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3067"},{"key":"e_1_2_11_13_1","doi-asserted-by":"crossref","unstructured":"KamaraS LauterKE.Cryptographic cloud storage. In: International Conference on Financial Cryptography and Data Security Vol.\u00a06054;2010;Berlin Heidelberg:136\u2010149.","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"e_1_2_11_14_1","doi-asserted-by":"crossref","unstructured":"ZhaoG RongC LiJ ZhangF TangY.Trusted data sharing over untrusted cloud storage providers. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CLOUDCOM);2010;Indianapolis IN USA:97\u2010103.","DOI":"10.1109\/CloudCom.2010.36"},{"key":"e_1_2_11_15_1","doi-asserted-by":"crossref","unstructured":"WangW LiZ OwensR BhargavaB.Secure and efficient access to outsourced data. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security;2009;Chicago USA:55\u201066.","DOI":"10.1145\/1655008.1655016"},{"key":"e_1_2_11_16_1","doi-asserted-by":"crossref","unstructured":"KumbhareAG SimmhanY PrasannaV.Designing a secure storage repository for sharing scientific datasets using public clouds. In: Proceedings of the Second International Workshop on Data Intensive Computing in the Clouds;2011;Seattle USA:31\u201040.","DOI":"10.1145\/2087522.2087530"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.09.034"},{"key":"e_1_2_11_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3395"},{"issue":"2","key":"e_1_2_11_19_1","first-page":"146","article-title":"Attribute\u2010based access control for multi\u2010authority systems with constant size ciphertext in cloud computing","volume":"13","author":"Yanli C","year":"2016","journal-title":"China Commun"},{"key":"e_1_2_11_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.002"},{"key":"e_1_2_11_21_1","doi-asserted-by":"crossref","unstructured":"BethencourtJ SahaiA WatersB.Ciphertext\u2010policy attribute\u2010based encryption. In: IEEE Symposium on Security and privacy 2007. sp\u201907;2007;California USA:321\u2010334.","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_2_11_22_1","doi-asserted-by":"crossref","unstructured":"WatersB.Ciphertext\u2010policy attribute\u2010based encryption: an expressive efficient and provably secure realization. In: International Workshop on Public Key Cryptography Vol.\u00a06571;2011;Berlin Heidelberg:53\u201070.","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"e_1_2_11_23_1","doi-asserted-by":"crossref","unstructured":"GoyalV JainA PandeyO SahaiA.Bounded ciphertext policy attribute based encryption. In: International Colloquium on Automata Languages and Programming;2008;Berlin Heidelberg:579\u2010591.","DOI":"10.1007\/978-3-540-70583-3_47"},{"key":"e_1_2_11_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.066"},{"key":"e_1_2_11_25_1","doi-asserted-by":"crossref","unstructured":"MillerVS.Use of elliptic curves in cryptography. In: Conference on the Theory and Application of Cryptographic Techniques Springer;1985;Linz Austria:417\u2010426.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_2_11_28_1","unstructured":"Reserve Bank of India (RBI).Report of the high level task force on public credit registry for india.https:\/\/rbi.org.in\/Scripts\/PublicationReportDetails.aspx?UrlPage=&ID=895;2018."},{"key":"e_1_2_11_29_1","doi-asserted-by":"crossref","unstructured":"BurrowsM AbadiM NeedhamRM.A logic of authentication. In: Proceedings of the Royal Society of London A: Mathematical Physical and Engineering Sciences Vol.\u00a0426;1989:233\u2010271.","DOI":"10.1098\/rspa.1989.0125"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2002-x"},{"key":"e_1_2_11_31_1","unstructured":"GroupIPW.Standard specifications for public\u2010key cryptography. Main web page athttp:\/\/grouperieeeorg\/groups\/1363;2004."},{"key":"e_1_2_11_32_1","doi-asserted-by":"crossref","unstructured":"BennettK GrothoffC HorozovT PatrascuI.Efficient sharing of encrypted data. In: Australasian Conference on Information Security and Privacy;2002;Berlin Heidelberg:107\u2010120.","DOI":"10.1007\/3-540-45450-0_8"},{"key":"e_1_2_11_33_1","doi-asserted-by":"crossref","unstructured":"StorerMW GreenanK LongDD MillerEL.Secure data deduplication. In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability;2008;Alexandria USA:1\u201010.","DOI":"10.1145\/1456469.1456471"},{"key":"e_1_2_11_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017428"},{"key":"e_1_2_11_35_1","doi-asserted-by":"crossref","unstructured":"StanekJ SorniottiA AndroulakiE KenclL.A secure data deduplication scheme for cloud storage. In: International Conference on Financial Cryptography and Data Security;2014;Berlin Heidelberg:99\u2010118.","DOI":"10.1007\/978-3-662-45472-5_8"},{"key":"e_1_2_11_36_1","doi-asserted-by":"crossref","unstructured":"KaanicheN LaurentM El\u00a0BarboriM.Cloudasec: a novel public\u2010key based framework to handle data sharing security in clouds. In: 2014 11th International Conference on Security and Cryptography (SECRYPT);2014;Vienna Austria:1\u201014.","DOI":"10.5220\/0005010600050018"},{"key":"e_1_2_11_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.04.021"},{"key":"e_1_2_11_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3423"},{"key":"e_1_2_11_39_1","unstructured":"ComputingRC.Openstack open source cloud computing software. Retrieved July 25 2016;2016."},{"key":"e_1_2_11_40_1","unstructured":"OPENSTACK SWIFT.Openstack swift: powering the world's largest storage clouds.https:\/\/www.swiftstack.com\/product\/open-source\/openstack-swift;2019."},{"key":"e_1_2_11_41_1","doi-asserted-by":"crossref","unstructured":"LoweDG et al.Object recognition from local scale\u2010invariant features.In: Proceedings of the Seventh IEEE International Conference on Computer Vision Vol.\u00a099;1999;Kerkyra Greece Greece:1150\u20101157.","DOI":"10.1109\/ICCV.1999.790410"},{"key":"e_1_2_11_42_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_2_11_43_1","doi-asserted-by":"crossref","unstructured":"YasudaM ShimoyamaT KogureJ IzuT.On the strength comparison of the ECDLP and the IFP. In: International Conference on Security and Cryptography for Networks;2012;Amalfi Italy:302\u2010325.","DOI":"10.1007\/978-3-642-32928-9_17"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.4072","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.4072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T00:08:45Z","timestamp":1694218125000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.4072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,16]]},"references-count":42,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["10.1002\/dac.4072"],"URL":"https:\/\/doi.org\/10.1002\/dac.4072","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,16]]},"assertion":[{"value":"2017-10-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}