Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique

被引:0
|
作者
Adilakshmi, Jyothi [1 ]
Rithika, Badgoian [1 ]
Pushpalatha, Chitikela [1 ]
Venkatesh, Thurpati [1 ]
Lohitha, Mandapati [1 ]
机构
[1] MLR Inst Technol, Dept Informat Technol, Hyderabad, India
关键词
Identity-Based Encryption; confidentiality; integrity; security; proxy re-encryption; centralized system;
D O I
10.1109/ICPCSN62568.2024.00117
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid advancement and widespread adoption of cloud computing have simplified data sharing processes. However, despite being a progressive technology, data security remains a paramount concern. In cloud-based storage, data owners may lack complete control over their data, as it is managed by a third-party entity, the cloud service provider. Securely storing and sharing data on the cloud presents significant challenges, particularly when data owners choose to share information with other parties, such as data users. To tackle this challenge, researchers have explored various encryption techniques in cryptography to ensure secure data sharing on the cloud. By leveraging proxy re-encryption, data owners can securely represent their encrypted data to the cloud through identity-based encryption, introducing an additional security layer to safeguard data during transfer. This approach restricts access to authorized users only, thereby enhancing data security. The proposed method, utilizing proxy re-encryption, is pivotal in facilitating reliable data sharing in cloud computing environments. This technique helps to manage data access effectively while minimizing potential congestion in centralized systems. The proposed approach has undergone rigorous security analysis and evaluation, marking a significant milestone in ensuring data integrity, confidentiality, and security. Such reassurance underscores the effectiveness of the implemented security measures, instilling confidence in the integrity of data management practices.
引用
收藏
页码:700 / 705
页数:6
相关论文
共 50 条
  • [31] A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
    Liang, Kaitai
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    Yu, Yong
    Yang, Anjia
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 95 - 108
  • [32] Proxy re-encryption architect for storing and sharing of cloud contents
    Rawal, Bharat S.
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2020, 35 (03) : 219 - 235
  • [33] Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud
    Bhatia, Tarunpreet
    Verma, A. K.
    Sharma, Gaurav
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2018, 29 (06):
  • [34] Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds
    Xu, Peng
    Xu, Jun
    Wang, Wei
    Jin, Hai
    Susilo, Willy
    Zou, Deqing
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 913 - 918
  • [35] Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
    Chen, Wei-Hao
    Fan, Chun-I
    Tseng, Yi-Fan
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 70 - 73
  • [36] Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds
    Luo, Fucai
    Wang, Haiyan
    Susilo, Willy
    Yan, Xingfu
    Zheng, Xiaofan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2919 - 2934
  • [37] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [38] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [39] A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain
    Chen, Yingwen
    Hu, Bowen
    Yu, Hujie
    Duan, Zhimin
    Huang, Junxin
    ELECTRONICS, 2021, 10 (19)
  • [40] Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (02) : 115 - 124