Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme

被引:4
|
作者
Sepehri, Masoomeh [1 ]
Trombetta, Alberto [2 ]
机构
[1] Univ Milan, Dipartimento Informat, Milan, Italy
[2] Univ Insubria, Dipartimento Sci Teoriche & Appllicate, Varese, Italy
关键词
Attribute-based Cryptography; Secure Cloud Data sharing; Fine-grained Access Policy;
D O I
10.1145/3098954.3104049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever-growing production of data coming from multiple, scattered, highly dynamical sources (like those found in IoT scenarios), it is compelling to (i) provide a seamless way to outsource the management and sharing of data (as provided by cloud services); (ii) assure an high security and privacy level to such data. As such, objectives (i) and (ii) are not easily reconcilable: for example, the way data is accessed may vary according to access policies of the users and of the cloud providers that share such data. In this paper, we argue that attribute-based proxy re-encryption is a viable solution for providing the flexibility needed in dynamic scenarios like the ones envisioned by large IoT deployments. Towards, this goal we present an efficient attribute-based, proxy re-encryption scheme that can be deployed in such scenarios, along with experimental results that confirm the viability of our approach.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Flexible attribute-based proxy re-encryption for efficient data sharing
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Zhou, Yunya
    [J]. INFORMATION SCIENCES, 2020, 511 : 94 - 113
  • [2] Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme
    Xu, Guangxia
    Huang, Yuling
    Ma, Chuang
    [J]. 2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 372 - 380
  • [3] Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
    Lin, Suqing
    Zhang, Rui
    Wang, Mingsheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1748 - 1758
  • [4] A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
    Liang, Kaitai
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    Yu, Yong
    Yang, Anjia
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 95 - 108
  • [5] A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2907 - 2919
  • [6] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [7] A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme
    Feng, Tao
    Wang, Dewei
    Gong, Renbin
    [J]. INFORMATION, 2023, 14 (05)
  • [8] Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme
    Tang, Yongli
    Jin, Minglu
    Meng, Hui
    Yang, Li
    Zheng, Chengfu
    [J]. ENTROPY, 2023, 25 (05)
  • [9] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689
  • [10] A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds
    Liang, Kaitai
    Fang, Liming
    Wong, Duncan S.
    Susilo, Willy
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 2004 - 2027