Abstract
AbstractWith increasing application of cloud computing and big data technologies, a large amount of personal information is stored on the Internet, which raises the issue of privacy leakage. To protect people’s data privacy, this paper firstly presents a new anonymous Identify-Based Encryption (IBE) scheme and gives the proof of its security under the Bilinear Diffie–Hellman Security Assumption. Then, by introducing the anonymous IBE scheme into anonymous communication fields, this paper introduces a new lightweight anonymous communication model for cloud computing, which guarantees the anonymity of system users and the security of messages in small groups. Our analysis shows that, the proposed communication model cannot only reduce memory consumption and improve message transmission efficiency, but also effectively resist traffic-analysis attacks, node eavesdropping, and finally achieve secure anonymous communication in cloud computing.
Funder
EU Horizon 2020 DOMINOES Project
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference36 articles.
1. H. Liu, H. Kou, C. Yan, L. Qi, Keywords-driven and popularity-aware paper recommendation based on undirected paper citation graph. Complexity 2020, 2085638–1208563815 (2020)
2. S. Jegadeesan, M. Azees, P.M. Kumar, G. Manogaran, N. Chilamkurti, R. Varatharajan, C.-H. Hsu, An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustain. Cities Soc. 49, 101522 (2019)
3. H. Wang, S. Ma, H.-N. Dai, M. Imran, T. Wang, Blockchain-based data privacy management with nudge theory in open banking. Future Gener. Comput. Syst. 110, 812–823 (2020)
4. M. Alloghani, M.M. Alani, D. Al-Jumeily, T. Baker, J. Mustafina, A. Hussain, A.J. Aljaaf, A systematic review on the status and progress of homomorphic encryption technologies. J. Inf. Secur. Appl. 48, 102362 (2019)
5. A. Bahramali, R. Soltani, A. Houmansadr, D. Goeckel, D. Towsley, Practical traffic analysis attacks on secure messaging applications (2020). arXiv preprint arXiv:2005.00508