A Searchable Hierarchical Conditional Proxy Re-Encryption Scheme for Cloud Storage Services

被引:10
|
作者
Lee, Cheng-Chi [1 ,2 ]
Li, Chun-Ta [3 ]
Chen, Chin-Ling [4 ]
Chiu, Shih-Ting [1 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, 510 Jhongjheng Rd, New Taipei 24205, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung 413, Taiwan
[3] Tainan Univ Technol, Dept Informat Management, 529 Jhong Jheng Rd, Tainan 710, Taiwan
[4] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, 168 Jifeng E Rd, Taichung 41349, Taiwan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2016年 / 45卷 / 03期
关键词
re-encryption; hierarchical conditional proxy re-encryption; proxy re-encryption; cloud storage; security; PUBLIC-KEY ENCRYPTION; SECURE;
D O I
10.5755/j01.itc.45.3.13224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud technologies thrive, researches in the field of cloud storage have switched their focus from encryption-decryption techniques that help data owners protect their privacy and data confidentiality to the application of searching techniques on encrypted data while maintaining high level security and privacy of outsource data. To begin with, Song et al. offered some practical techniques for searches on encrypted data. After that, Weng et al. presented their conditional proxy re-encryption scheme where the data owner can decide which ciphertext satisfies a certain keyword condition set and then can have the retrieved data re-encrypted by the semi-trusted proxy server. The basic concepts of the above schemes are indeed quite innovative and do lead the way towards the solutions to the major practical cloud storage application problems; however, of all the researches that follow, none has had both searching on encrypted data and conditional proxy re-encryption combined. In this paper, we propose a new scheme for cloud storage services that integrates keyword search with conditional proxy re-encryption. This say, with a newly added keyword or new proxy, the cloud service provider is able to generate a hierarchical key. As far as data security is concerned, our scheme provides proven data owner authentication, re-delegation, and chosen-ciphertext security. The superior performance of the proposed scheme has been established by comparing it with related works, and our security analysis as well as BAN logic correctness check also offered solid proof that the new scheme is both secure and practical.
引用
下载
收藏
页码:289 / 299
页数:11
相关论文
共 50 条
  • [21] Proxy Impersonation Safe Conditional Proxy Re-Encryption
    Gandhi, Dheeraj
    Rangan, Pandu
    Selvi, Sharmila Deva
    Vivek, Sree
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 33 - 44
  • [22] Secure bidirectional proxy re-encryption for cryptographic cloud storage
    Shao, Jun
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Kaitai
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 113 - 121
  • [23] A new conditional proxy re-encryption scheme based on secret sharing
    Lan, C.-H. (lanzhourm@163.com), 1600, Science Press (36):
  • [24] Certificateless Threshold-Based Conditional Proxy Re-Encryption Scheme
    Li Z.
    Zhang L.
    Zhao H.
    Wei Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (01): : 44 - 49+83
  • [25] Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme
    Tang, Yongli
    Jin, Minglu
    Meng, Hui
    Yang, Li
    Zheng, Chengfu
    ENTROPY, 2023, 25 (05)
  • [26] Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme
    Xu, Guangxia
    Huang, Yuling
    Ma, Chuang
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 372 - 380
  • [27] A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud Storage
    Wang, Haiyong
    Peng, Yao
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 413 - 425
  • [28] CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
    Mishra, Bharati
    Jena, Debsish
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [29] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 624 - 651
  • [30] A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain
    Eltayieb, Nabeil
    Sun, Liang
    Wang, Ke
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 293 - 307