A Secure Re-Encryption Scheme for Data Sharing in Unreliable Cloud Environment

被引:6
|
作者
Sultan, Nazatul Haque [1 ]
Barbhuiya, Ferdous Ahmed [1 ]
机构
[1] Indian Inst Informat Technol, Gauhati, India
关键词
cloud access control; attribute-based encryption; identity-based encryption; proxy re-encryption; user revocation;
D O I
10.1109/SERVICES.2016.16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To share encrypted data in cloud storage, data owner provides decryption keys to authorised users. When such a user is revoked, the encrypted data related to revoked user is re-encrypted and new decryption keys are re-distributed among the non-revoked users. In this paper, an efficient and secure re-encryption scheme has been proposed for data sharing in unreliable cloud environment. The scheme is built on top of Ciphertext-Policy based Attribute-Based Encryption (CPABE), which will provide fine-grained access control to share data. The scheme can achieve user revocation without whole ciphertexts re-encryption and key re-distributions. In addition, re-encryption is not performed until a user requests for that data, which reduces overheads. Further, it does not need any clock synchronization. Moreover, the scheme is proven to be secured under Computational Bilinear Diffie-Hellman (CBDH) assumption. A comparison with the other notable work in this area shows that the performance is better in terms of functionality, computational and communication overheads.
引用
收藏
页码:75 / 80
页数:6
相关论文
共 50 条
  • [21] A proxy broadcast re-encryption for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10455 - 10469
  • [22] PRE+: dual of proxy re-encryption for secure cloud data sharing service
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Barolli, Leonard
    Ge, Yunlong
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 44 - 69
  • [23] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [24] A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain
    Chen, Yingwen
    Hu, Bowen
    Yu, Hujie
    Duan, Zhimin
    Huang, Junxin
    [J]. ELECTRONICS, 2021, 10 (19)
  • [25] Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Zheng, Zhiheng
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 130 : 153 - 165
  • [26] Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing
    Yan, Lu
    Qin, Haozhe
    Yang, Kexin
    Xie, Heye
    Wang, Xu An
    Liu, Shuanggen
    [J]. ELECTRONICS, 2024, 13 (03)
  • [27] POSTER: A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing
    Wu, Xiaoxin
    Xu, Lei
    Zhang, Xinwen
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 869 - 871
  • [28] Non-transferable Unidirectional Proxy Re-encryption Scheme for Secure Social Cloud Storage Sharing
    Wang, Xu An
    Xhafa, Fatos
    Hao, Wei
    He, Wei
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 328 - 331
  • [29] Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
    Lin, Suqing
    Zhang, Rui
    Wang, Mingsheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1748 - 1758
  • [30] A certificate-based proxy re-encryption plus scheme for secure medical data sharing
    Liu, Shuanggen
    Qin, Haozhe
    Taniar, David
    Liu, Wandi
    Li, Yuanjun
    Zhang, Jindan
    [J]. INTERNET OF THINGS, 2023, 23