A Secure Re-Encryption Scheme for Data Sharing in Unreliable Cloud Environment

被引:6
|
作者
Sultan, Nazatul Haque [1 ]
Barbhuiya, Ferdous Ahmed [1 ]
机构
[1] Indian Inst Informat Technol, Gauhati, India
关键词
cloud access control; attribute-based encryption; identity-based encryption; proxy re-encryption; user revocation;
D O I
10.1109/SERVICES.2016.16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To share encrypted data in cloud storage, data owner provides decryption keys to authorised users. When such a user is revoked, the encrypted data related to revoked user is re-encrypted and new decryption keys are re-distributed among the non-revoked users. In this paper, an efficient and secure re-encryption scheme has been proposed for data sharing in unreliable cloud environment. The scheme is built on top of Ciphertext-Policy based Attribute-Based Encryption (CPABE), which will provide fine-grained access control to share data. The scheme can achieve user revocation without whole ciphertexts re-encryption and key re-distributions. In addition, re-encryption is not performed until a user requests for that data, which reduces overheads. Further, it does not need any clock synchronization. Moreover, the scheme is proven to be secured under Computational Bilinear Diffie-Hellman (CBDH) assumption. A comparison with the other notable work in this area shows that the performance is better in terms of functionality, computational and communication overheads.
引用
收藏
页码:75 / 80
页数:6
相关论文
共 50 条
  • [1] Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    [J]. INFORMATION SCIENCES, 2014, 258 : 355 - 370
  • [2] A secure re-encryption scheme for data services in a cloud computing environment
    Xiong, Lizhi
    Xu, Zhengquan
    Xu, Yanyan
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17): : 4573 - 4585
  • [3] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Raghav
    Andola, Nitish
    Verma, Katyayani
    Venkatesan, S.
    Verma, Shekhar
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14117 - 14145
  • [4] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Nitish Raghav
    Katyayani Andola
    S. Verma
    Shekhar Venkatesan
    [J]. The Journal of Supercomputing, 2023, 79 : 14117 - 14145
  • [5] Conditional Proxy Re-Encryption for Secure Big Data Group Sharing in Cloud Environment
    Son, Junggab
    Kim, Donghyun
    Hussain, Rasheed
    Oh, Heekuck
    [J]. 2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 541 - 546
  • [6] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    [J]. Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 398 - 405
  • [7] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
    Wang L.-L.
    Chen K.-F.
    Mao X.-P.
    Wang Y.-T.
    [J]. Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405
  • [8] Identity Based Proxy Re-encryption Scheme (IBPRE+) for Secure Cloud Data Sharing
    Wang, Xu An
    Xhafa, Fatos
    Zheng, Zhiheng
    Nie, Jinting
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 44 - 48
  • [9] A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing
    Liang, Kaitai
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    Tran Viet Xuan Phuong
    Xie, Qi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) : 1667 - 1680
  • [10] CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
    Mishra, Bharati
    Jena, Debsish
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,