A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment

被引:8
|
作者
Son, Junggab [1 ]
Kim, Donghyun [1 ]
Bhuiyan, Md Zakirul Alam [2 ]
Hussain, Rasheed [3 ]
Oh, Heekuck [4 ]
机构
[1] Kennesaw State Univ, Dept Comp Sci, Marietta, GA 30060 USA
[2] Fordham Univ, Dept Comp & Informat Sci, Bronx, NY 10458 USA
[3] Innopolis Univ, Inst Informat Sci, Innopolis, Russia
[4] Hanyang Univ, Dept Comp Sci & Engn, Ansan, South Korea
来源
基金
新加坡国家研究基金会;
关键词
cloud computing; mobile cloud; proxy re-encryption; conditional proxy re-encryption; outsourcing computation; SCHEME;
D O I
10.1002/cpe.3946
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The mobile cloud is a highly heterogenous and constantly evolving network of numerous portable devices utilizing the powerful back-end cloud infrastructure to overcome their severe deficiency in computing resource and offer various services such as data sharing. Inherently, in mobile cloud, the risk of user privacy invasion by the cloud operator is high. The conditional proxy re-encryption (CPRE) is a useful concept for secure group data sharing via cloud while preserving the privacy of the shared data from any unintended third parties including the cloud operator. Unfortunately, the state-of-art CPRE is not particularly designed for mobile cloud environment and therefore imposes heavy burdens to the weak mobile cloud clients. This paper introduces a new CPRE scheme, namely the CPRE for mobile cloud, which utilizes the back-end cloud to the extreme extent so that the overhead of terminals is drastically reduced. Specifically, our scheme outsources a significant amount of computation overhead caused by the following functions at terminals: (a) re-encryption key generation, (b) condition value change, and (c) decryption, to the cloud. The proposed scheme also allows users to verify the correctness of outsourced computation under refereed delegation of computation model. Our simulation results show CPRE for mobile cloud that outperforms its existing alternatives. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing
    Wang, Xu An
    Nedjah, Nadia
    Sangaiah, Arun Kumar
    Shan, Chun
    Wang, Zuliang
    [J]. ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 3PGCIC-2018, 2019, 24 : 478 - 485
  • [2] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 624 - 651
  • [3] A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    [J]. IEEE ACCESS, 2018, 6 : 70017 - 70024
  • [4] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Abdul Nasir Khan
    M. L. Mat Kiah
    Sajjad A. Madani
    Mazhar Ali
    Atta ur Rehman Khan
    Shahaboddin Shamshirband
    [J]. The Journal of Supercomputing, 2014, 68 : 624 - 651
  • [5] A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud
    Chen, Zhanwen
    Chen, Jiageng
    Meng, Weizhi
    [J]. 2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 569 - 576
  • [6] Conditional Proxy Re-Encryption for Secure Big Data Group Sharing in Cloud Environment
    Son, Junggab
    Kim, Donghyun
    Hussain, Rasheed
    Oh, Heekuck
    [J]. 2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 541 - 546
  • [7] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [8] On the Security of a Conditional Proxy Re-Encryption
    Zhang, Xi
    Chen, Min-Rong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2644 - 2647
  • [9] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [10] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    [J]. Science China(Information Sciences), 2013, 56 (05) : 211 - 223