Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme

被引:4
|
作者
Sepehri, Masoomeh [1 ]
Trombetta, Alberto [2 ]
机构
[1] Univ Milan, Dipartimento Informat, Milan, Italy
[2] Univ Insubria, Dipartimento Sci Teoriche & Appllicate, Varese, Italy
关键词
Attribute-based Cryptography; Secure Cloud Data sharing; Fine-grained Access Policy;
D O I
10.1145/3098954.3104049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever-growing production of data coming from multiple, scattered, highly dynamical sources (like those found in IoT scenarios), it is compelling to (i) provide a seamless way to outsource the management and sharing of data (as provided by cloud services); (ii) assure an high security and privacy level to such data. As such, objectives (i) and (ii) are not easily reconcilable: for example, the way data is accessed may vary according to access policies of the users and of the cloud providers that share such data. In this paper, we argue that attribute-based proxy re-encryption is a viable solution for providing the flexibility needed in dynamic scenarios like the ones envisioned by large IoT deployments. Towards, this goal we present an efficient attribute-based, proxy re-encryption scheme that can be deployed in such scenarios, along with experimental results that confirm the viability of our approach.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] HRA-secure attribute-based threshold proxy re-encryption from lattices
    Zhao, Feixiang
    Weng, Jian
    Xie, Wenli
    Li, Ming
    Weng, Jiasi
    [J]. INFORMATION SCIENCES, 2024, 655
  • [32] A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment
    Li, Juyan
    Peng, Jialiang
    Qiao, Zhiqi
    [J]. BIG DATA, 2022,
  • [33] A certificate-based proxy re-encryption plus scheme for secure medical data sharing
    Liu, Shuanggen
    Qin, Haozhe
    Taniar, David
    Liu, Wandi
    Li, Yuanjun
    Zhang, Jindan
    [J]. INTERNET OF THINGS, 2023, 23
  • [34] Identity Based Proxy Re-encryption Scheme (IBPRE+) for Secure Cloud Data Sharing
    Wang, Xu An
    Xhafa, Fatos
    Zheng, Zhiheng
    Nie, Jinting
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 44 - 48
  • [35] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808
  • [36] Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    [J]. INFORMATION SCIENCES, 2014, 258 : 355 - 370
  • [37] Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating
    Naruse, Takeru
    Mohri, Masami
    Shiraishi, Yoshiaki
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2015, 5
  • [38] Attribute-based Proxy Re-encryption Method for Revocation in Cloud Data Storage
    Yasumura, Yoshiko
    Imabayashi, Hiroki
    Yamana, Hayato
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4858 - 4860
  • [39] Attribute-Based Re-Encryption Scheme in the Standard Model
    GUO Shanqing1
    2. State Key Laboratory of Novel Software Technology
    [J]. Wuhan University Journal of Natural Sciences, 2008, (05) : 621 - 625
  • [40] Attribute-based proxy re-encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Fuqun
    Chen, Kefei
    [J]. THEORETICAL COMPUTER SCIENCE, 2021, 865 : 52 - 62