A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing

被引:7
|
作者
Tang, Yongli [1 ]
Lian, Huanhuan [1 ]
Zhao, Zemao [2 ]
Yan, Xixi [1 ]
机构
[1] Henan Polytech Univ, Coll Comp Sci & Technol, Jiaozuo 454000, Peoples R China
[2] Lishui Univ, Sch Engn, Lishui 323000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2018年 / 56卷 / 02期
关键词
Cloud computing; keyword search; proxy re-encryption; provable security;
D O I
10.3970/cmc.2018.02965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of cloud computing technology, more and more users and enterprises decide to store their data in a cloud server by outsourcing. However, these huge amounts of data may contain personal privacy, business secrets and other sensitive information of the users and enterprises. Thus, at present, how to protect, retrieve, and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment. A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server. In this scheme, the user data are divided into files, file indexes and the keyword corresponding to the files, which are respectively encrypted to store. The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes, but re-encrypt the cipher-text of keywords corresponding to the files. Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack. And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption. Furthermore, the scheme does not need to use any secure channels, making it more effective in the cloud environment.
引用
收藏
页码:339 / 352
页数:14
相关论文
共 50 条
  • [1] Efficient proxy re-encryption with keyword search scheme
    Guo, Lifeng
    Lu, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (06): : 1221 - 1228
  • [2] Proxy re-encryption with keyword search
    Shao, Jun
    Cao, Zhenfu
    Liang, Xiaohui
    Lin, Huang
    INFORMATION SCIENCES, 2010, 180 (13) : 2576 - 2587
  • [3] A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing
    Chen, Zhenhua
    Li, Shundong
    Guo, Yimin
    Wang, Yilei
    Chu, Yunjie
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 82 - 95
  • [4] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808
  • [5] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689
  • [6] An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services
    Sharma, Sumit
    Swarnakar, Ashutosh
    Babu, Ch Jayanth
    Padmavathy, R.
    Kumar, Rakesh
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [7] Further observation on proxy re-encryption with keyword search
    Wang, Xu An
    Huang, Xinyi
    Yang, Xiaoyuan
    Liu, Longfei
    Wu, Xuguang
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (03) : 643 - 654
  • [8] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 624 - 651
  • [9] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Abdul Nasir Khan
    M. L. Mat Kiah
    Sajjad A. Madani
    Mazhar Ali
    Atta ur Rehman Khan
    Shahaboddin Shamshirband
    The Journal of Supercomputing, 2014, 68 : 624 - 651
  • [10] Towards Secure Data Sharing in Cloud Computing Using Attribute Based Proxy Re-Encryption with Keyword Search
    Hong, Hanshu
    Sun, Zhixin
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 218 - 223