Offline privacy preserving proxy re-encryption in mobile cloud computing

被引:8
作者
Koe, Arthur Sandor Voundi [1 ,2 ]
Lin, Yaping [1 ,2 ]
机构
[1] Hunan Univ, Coll Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
[2] Hunan Prov Key Lab Dependable Syst & Networks, Changsha 410082, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Authorization; Ciphertext policy attribute-based encryption; Mobile cloud computing; Proxy re-encryption;
D O I
10.1016/j.pmcj.2019.101081
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the always online behavior of the data owner in proxy re-encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued to legitimate users. An in depth analysis shows that our scheme is secure, flexible and efficient for mobile cloud computing (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:12
相关论文
共 33 条
  • [21] Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage
    Sandor, Voundi Koe Arthur
    Lin, Yaping
    Li, Xiehua
    Lin, Feng
    Zhang, Shiwen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 129 : 25 - 36
  • [22] Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
    Seo, Jae Woo
    Yum, Dae Hyun
    Lee, Pil Joong
    [J]. THEORETICAL COMPUTER SCIENCE, 2013, 491 : 83 - 93
  • [23] Anonymous proxy re-encryption
    Shao, Jun
    Liu, Peng
    Wei, Guiyi
    Ling, Yun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 439 - 449
  • [24] Tang Q, 2008, LECT NOTES COMPUT SC, V5365, P130, DOI 10.1007/978-3-540-89754-5_11
  • [25] Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
    Wang, Shulan
    Liang, Kaitai
    Liu, Joseph K.
    Chen, Jianyong
    Yu, Jianping
    Xie, Weixin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1661 - 1673
  • [26] Identity Based Proxy Re-encryption Scheme (IBPRE+) for Secure Cloud Data Sharing
    Wang, Xu An
    Xhafa, Fatos
    Zheng, Zhiheng
    Nie, Jinting
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 44 - 48
  • [27] Weng J., 2009, ASIACCS, P322, DOI DOI 10.1145/1533057.1533100
  • [28] Weng J, 2009, LECT NOTES COMPUT SC, V5735, P151, DOI 10.1007/978-3-642-04474-8_13
  • [29] Xiaoqi Jia, 2010, Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT 2010), P1299, DOI 10.1109/CIT.2010.234
  • [30] Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    Yu, Shucheng
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,