A secure re-encryption scheme for data services in a cloud computing environment

被引:19
|
作者
Xiong, Lizhi [1 ]
Xu, Zhengquan [1 ]
Xu, Yanyan [1 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
cloud data services; data security; re-encryption; untrusted cloud service provider; cloud computing; PROXY; STORAGE;
D O I
10.1002/cpe.3423
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing as a promising technology and paradigm can provide various data services, such as data sharing and distribution, which allows users to derive benefits without the need for deep knowledge about them. However, the popular cloud data services also bring forth many new data security and privacy challenges. Cloud service provider untrusted, outsourced data security, hence collusion attacks from cloud service providers and data users become extremely challenging issues. To resolve these issues, we design the basic parts of secure re-encryption scheme for data services in a cloud computing environment, and further propose an efficient and secure re-encryption algorithm based on the EIGamal algorithm, to satisfy basic security requirements. The proposed scheme not only makes full use of the powerful processing ability of cloud computing but also can effectively ensure cloud data security. Extensive analysis shows that our proposed scheme is highly efficient and provably secure under existing security model. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:4573 / 4585
页数:13
相关论文
共 50 条
  • [21] Hierarchical Identity Role based proxy re-encryption scheme for cloud computing
    Nirmala, V
    Shanmugalakshmi, R.
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,
  • [22] A cloud data deduplication scheme based on certificateless proxy re-encryption
    Zheng, Xiaoyu
    Zhou, Yuyang
    Ye, Yalan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 102
  • [23] Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment
    Ma, Chunguang
    Li, Juyan
    Ouyang, Weiping
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 645 - 660
  • [24] An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services
    Sharma, Sumit
    Swarnakar, Ashutosh
    Babu, Ch Jayanth
    Padmavathy, R.
    Kumar, Rakesh
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [25] A Searchable Hierarchical Conditional Proxy Re-Encryption Scheme for Cloud Storage Services
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chin-Ling
    Chiu, Shih-Ting
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 289 - 299
  • [26] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [27] A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
    Chang, Yan
    Zhang, Shi-Bin
    Yan, Li-Li
    Wan, Guo-gen
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [28] Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing
    Wang, Xu An
    Yang, Xiaoyuan
    Li, Cong
    Liu, Yudong
    Ding, Yong
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2018, 15 (03) : 585 - 614
  • [29] A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
    Yan Chang
    Shi-Bin Zhang
    Li-Li Yan
    Guo-gen Wan
    Scientific Reports, 10
  • [30] Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing
    Bhatia, Tarunpreet
    Verma, A. K.
    Sharma, Gaurav
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (05):