A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing

被引:7
|
作者
Tang, Yongli [1 ]
Lian, Huanhuan [1 ]
Zhao, Zemao [2 ]
Yan, Xixi [1 ]
机构
[1] Henan Polytech Univ, Coll Comp Sci & Technol, Jiaozuo 454000, Peoples R China
[2] Lishui Univ, Sch Engn, Lishui 323000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2018年 / 56卷 / 02期
关键词
Cloud computing; keyword search; proxy re-encryption; provable security;
D O I
10.3970/cmc.2018.02965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of cloud computing technology, more and more users and enterprises decide to store their data in a cloud server by outsourcing. However, these huge amounts of data may contain personal privacy, business secrets and other sensitive information of the users and enterprises. Thus, at present, how to protect, retrieve, and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment. A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server. In this scheme, the user data are divided into files, file indexes and the keyword corresponding to the files, which are respectively encrypted to store. The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes, but re-encrypt the cipher-text of keywords corresponding to the files. Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack. And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption. Furthermore, the scheme does not need to use any secure channels, making it more effective in the cloud environment.
引用
收藏
页码:339 / 352
页数:14
相关论文
共 50 条
  • [41] Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing
    Yue, Na
    Wang, Yang
    Wang, Mingqiang
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 264 - 269
  • [42] A proxy broadcast re-encryption for cloud data sharing
    Maosheng Sun
    Chunpeng Ge
    Liming Fang
    Jiandong Wang
    Multimedia Tools and Applications, 2018, 77 : 10455 - 10469
  • [43] Performance Analysis of the Symmetric Proxy Re-encryption Scheme
    Meiliasari, Rizky Putri
    Syalim, Amril
    Yazid, Setiadi
    2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 91 - 96
  • [44] On the Insecurity of an Identity Based Proxy Re-encryption Scheme
    Wang, Xu An
    Yang, Xiaoyuan
    FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) : 277 - 281
  • [45] A real-time parking service with proxy re-encryption in vehicular cloud computing
    Lin, Iuon-Chang
    Cheng, Chen-Yang
    Chen, Hsiang-Yu
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2019, 85 : 208 - 213
  • [46] A Timed-Release Proxy Re-Encryption Scheme
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (08) : 1682 - 1695
  • [47] Improved Proxy Re-encryption Scheme with Equality Test
    Yang, Chih-Chen
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    Tseng, Yi-Fan
    2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 37 - 44
  • [48] Proxy Re-encryption Scheme from IBE to CBE
    Wang, Xu An
    Yang, Xiaoyuan
    Zhang, Minqing
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 99 - 102
  • [49] Anonymous attribute-based proxy re-encryption for access control in cloud computing
    Zhang, Yinghui
    Li, Jin
    Chen, Xiaofeng
    Li, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2397 - 2411
  • [50] Circular Transitivity of a Bidirectional Proxy Re-encryption Scheme
    Hong, Xiaojing
    Wang, Bin
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2639 - +