Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique

被引:0
|
作者
Adilakshmi, Jyothi [1 ]
Rithika, Badgoian [1 ]
Pushpalatha, Chitikela [1 ]
Venkatesh, Thurpati [1 ]
Lohitha, Mandapati [1 ]
机构
[1] MLR Inst Technol, Dept Informat Technol, Hyderabad, India
关键词
Identity-Based Encryption; confidentiality; integrity; security; proxy re-encryption; centralized system;
D O I
10.1109/ICPCSN62568.2024.00117
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid advancement and widespread adoption of cloud computing have simplified data sharing processes. However, despite being a progressive technology, data security remains a paramount concern. In cloud-based storage, data owners may lack complete control over their data, as it is managed by a third-party entity, the cloud service provider. Securely storing and sharing data on the cloud presents significant challenges, particularly when data owners choose to share information with other parties, such as data users. To tackle this challenge, researchers have explored various encryption techniques in cryptography to ensure secure data sharing on the cloud. By leveraging proxy re-encryption, data owners can securely represent their encrypted data to the cloud through identity-based encryption, introducing an additional security layer to safeguard data during transfer. This approach restricts access to authorized users only, thereby enhancing data security. The proposed method, utilizing proxy re-encryption, is pivotal in facilitating reliable data sharing in cloud computing environments. This technique helps to manage data access effectively while minimizing potential congestion in centralized systems. The proposed approach has undergone rigorous security analysis and evaluation, marking a significant milestone in ensuring data integrity, confidentiality, and security. Such reassurance underscores the effectiveness of the implemented security measures, instilling confidence in the integrity of data management practices.
引用
收藏
页码:700 / 705
页数:6
相关论文
共 50 条
  • [21] Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing
    Hu, Huidan
    Zhou, Yuanjian
    Cao, Zhenfu
    Dong, Xiaolei
    APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [22] Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things
    Pei, Hongmei
    Yang, Peng
    Li, Weihao
    Du, Miao
    Hu, Zhongjian
    COMPUTER NETWORKS, 2024, 245
  • [23] A Secure Re-Encryption Scheme for Data Sharing in Unreliable Cloud Environment
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016, 2016, : 75 - 80
  • [24] Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing
    Manzoor, Ahsan
    Liyanage, Madhsanka
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 99 - 103
  • [25] Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services
    Cha, Hyun-Jong
    Yang, Ho-Kyung
    Song, You-Jin
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2018, 11 (10): : 29 - 39
  • [26] Cloud based data sharing with fine-grained proxy re-encryption
    Yang, Yanjiang
    Zhu, Haiyan
    Lu, Haibing
    Weng, Jian
    Zhang, Youcheng
    Choo, Kim-Kwang Raymond
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 122 - 134
  • [27] Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing
    Qin, Zhiguang
    Wu, Shikun
    Xiong, Hu
    BIG DATA COMPUTING AND COMMUNICATIONS, 2015, 9196 : 205 - 216
  • [28] Secure bidirectional proxy re-encryption for cryptographic cloud storage
    Shao, Jun
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Kaitai
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 113 - 121
  • [29] Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing
    Bhatia, Tarunpreet
    Verma, A. K.
    Sharma, Gaurav
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (05):
  • [30] Towards Secure Data Sharing in Cloud Computing Using Attribute Based Proxy Re-Encryption with Keyword Search
    Hong, Hanshu
    Sun, Zhixin
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 218 - 223