A secure re-encryption scheme for data services in a cloud computing environment

被引:19
|
作者
Xiong, Lizhi [1 ]
Xu, Zhengquan [1 ]
Xu, Yanyan [1 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Peoples R China
来源
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 2015年 / 27卷 / 17期
基金
中国国家自然科学基金;
关键词
cloud data services; data security; re-encryption; untrusted cloud service provider; cloud computing; PROXY; STORAGE;
D O I
10.1002/cpe.3423
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing as a promising technology and paradigm can provide various data services, such as data sharing and distribution, which allows users to derive benefits without the need for deep knowledge about them. However, the popular cloud data services also bring forth many new data security and privacy challenges. Cloud service provider untrusted, outsourced data security, hence collusion attacks from cloud service providers and data users become extremely challenging issues. To resolve these issues, we design the basic parts of secure re-encryption scheme for data services in a cloud computing environment, and further propose an efficient and secure re-encryption algorithm based on the EIGamal algorithm, to satisfy basic security requirements. The proposed scheme not only makes full use of the powerful processing ability of cloud computing but also can effectively ensure cloud data security. Extensive analysis shows that our proposed scheme is highly efficient and provably secure under existing security model. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:4573 / 4585
页数:13
相关论文
共 50 条
  • [1] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 624 - 651
  • [2] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Abdul Nasir Khan
    M. L. Mat Kiah
    Sajjad A. Madani
    Mazhar Ali
    Atta ur Rehman Khan
    Shahaboddin Shamshirband
    The Journal of Supercomputing, 2014, 68 : 624 - 651
  • [3] Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    INFORMATION SCIENCES, 2014, 258 : 355 - 370
  • [4] Secure multimedia distribution in cloud computing using re-encryption and fingerprinting
    Xiong, Lizhi
    Xia, Zhihua
    Chen, Xianyi
    Shim, Hiuk Jae
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (21) : 30297 - 30313
  • [5] Secure multimedia distribution in cloud computing using re-encryption and fingerprinting
    Lizhi Xiong
    Zhihua Xia
    Xianyi Chen
    Hiuk Jae Shim
    Multimedia Tools and Applications, 2019, 78 : 30297 - 30313
  • [6] Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing
    Qin, Zhiguang
    Wu, Shikun
    Xiong, Hu
    BIG DATA COMPUTING AND COMMUNICATIONS, 2015, 9196 : 205 - 216
  • [7] Secure Cloud Data Deduplication with Efficient Re-Encryption
    Yuan, Haoran
    Chen, Xiaofeng
    Li, Jin
    Jiang, Tao
    Wang, Jianfeng
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 442 - 456
  • [8] A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
    Tang, Yongli
    Lian, Huanhuan
    Zhao, Zemao
    Yan, Xixi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02): : 339 - 352
  • [9] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 398 - 405
  • [10] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
    Wang L.-L.
    Chen K.-F.
    Mao X.-P.
    Wang Y.-T.
    Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405