A secure re-encryption scheme for data services in a cloud computing environment

被引:19
|
作者
Xiong, Lizhi [1 ]
Xu, Zhengquan [1 ]
Xu, Yanyan [1 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
cloud data services; data security; re-encryption; untrusted cloud service provider; cloud computing; PROXY; STORAGE;
D O I
10.1002/cpe.3423
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing as a promising technology and paradigm can provide various data services, such as data sharing and distribution, which allows users to derive benefits without the need for deep knowledge about them. However, the popular cloud data services also bring forth many new data security and privacy challenges. Cloud service provider untrusted, outsourced data security, hence collusion attacks from cloud service providers and data users become extremely challenging issues. To resolve these issues, we design the basic parts of secure re-encryption scheme for data services in a cloud computing environment, and further propose an efficient and secure re-encryption algorithm based on the EIGamal algorithm, to satisfy basic security requirements. The proposed scheme not only makes full use of the powerful processing ability of cloud computing but also can effectively ensure cloud data security. Extensive analysis shows that our proposed scheme is highly efficient and provably secure under existing security model. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:4573 / 4585
页数:13
相关论文
共 50 条
  • [41] Secure bidirectional proxy re-encryption for cryptographic cloud storage
    Shao, Jun
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Kaitai
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 113 - 121
  • [42] Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Zheng, Zhiheng
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 130 : 153 - 165
  • [43] Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing
    Eltayieb, Nabeil
    Elhabob, Rashad
    Abdelgader, Abdeldime M. S.
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
  • [44] Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing
    Yan, Lu
    Qin, Haozhe
    Yang, Kexin
    Xie, Heye
    Wang, Xu An
    Liu, Shuanggen
    ELECTRONICS, 2024, 13 (03)
  • [45] Keyword Searchable Re-encryption Scheme Considering Cloud Storage-Service Environment
    Lee, Sun-Ho
    Lee, Im-Yeong
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (05): : 2135 - 2146
  • [46] PRE+: dual of proxy re-encryption for secure cloud data sharing service
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Barolli, Leonard
    Ge, Yunlong
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 44 - 69
  • [47] A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Ali, Mazhar
    Shamshirband, Shahaboddin
    Khan, Atta Ur Rehman
    JOURNAL OF GRID COMPUTING, 2015, 13 (04) : 651 - 675
  • [48] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [49] FPGA-Based Symmetric Re-Encryption Scheme to Secure Data Processing for Cloud-Integrated Internet of Things
    Al-Asli, M.
    Elrabaa, M. E. S.
    Abu-Amara, M.
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 446 - 457
  • [50] A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach
    Abdul Nasir Khan
    M. L. Mat Kiah
    Mazhar Ali
    Shahaboddin Shamshirband
    Atta ur Rehman Khan
    Journal of Grid Computing, 2015, 13 : 651 - 675