A secure re-encryption scheme for data services in a cloud computing environment

被引:19
|
作者
Xiong, Lizhi [1 ]
Xu, Zhengquan [1 ]
Xu, Yanyan [1 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Peoples R China
来源
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 2015年 / 27卷 / 17期
基金
中国国家自然科学基金;
关键词
cloud data services; data security; re-encryption; untrusted cloud service provider; cloud computing; PROXY; STORAGE;
D O I
10.1002/cpe.3423
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing as a promising technology and paradigm can provide various data services, such as data sharing and distribution, which allows users to derive benefits without the need for deep knowledge about them. However, the popular cloud data services also bring forth many new data security and privacy challenges. Cloud service provider untrusted, outsourced data security, hence collusion attacks from cloud service providers and data users become extremely challenging issues. To resolve these issues, we design the basic parts of secure re-encryption scheme for data services in a cloud computing environment, and further propose an efficient and secure re-encryption algorithm based on the EIGamal algorithm, to satisfy basic security requirements. The proposed scheme not only makes full use of the powerful processing ability of cloud computing but also can effectively ensure cloud data security. Extensive analysis shows that our proposed scheme is highly efficient and provably secure under existing security model. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:4573 / 4585
页数:13
相关论文
共 50 条
  • [21] A 3-Level Re-Encryption Model to Ensure Data Protection in Cloud Computing Environments
    Ahmadi, Mohammad
    Moghaddam, Faraz Fatemi
    Jam, Amid Jamshidi
    Gholizadeh, Somayyeh
    Eslami, Mohammad
    2014 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC 2014), 2014, : 36 - 40
  • [22] Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing
    Eltayieb, Nabeil
    Elhabob, Rashad
    Abdelgader, Abdeldime M. S.
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
  • [23] Keyword Searchable Re-encryption Scheme Considering Cloud Storage-Service Environment
    Lee, Sun-Ho
    Lee, Im-Yeong
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (05): : 2135 - 2146
  • [24] A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Ali, Mazhar
    Shamshirband, Shahaboddin
    Khan, Atta Ur Rehman
    JOURNAL OF GRID COMPUTING, 2015, 13 (04) : 651 - 675
  • [25] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [26] A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach
    Abdul Nasir Khan
    M. L. Mat Kiah
    Mazhar Ali
    Shahaboddin Shamshirband
    Atta ur Rehman Khan
    Journal of Grid Computing, 2015, 13 : 651 - 675
  • [27] A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing
    Chen, Zhenhua
    Li, Shundong
    Guo, Yimin
    Wang, Yilei
    Chu, Yunjie
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 82 - 95
  • [28] POSTER: A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing
    Wu, Xiaoxin
    Xu, Lei
    Zhang, Xinwen
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 869 - 871
  • [29] A CP-ABE Scheme with Cloud Proxy Re-Encryption
    Zhao K.-Q.
    Kang P.
    Liu B.
    Guo Z.
    Feng C.-S.
    Qing Y.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (03): : 728 - 735
  • [30] Assured Update Scheme of Authorization for Cloud Data Access Based on Proxy Re-encryption
    Su M.
    Wu B.
    Fu A.-M.
    Yu Y.
    Zhang G.-X.
    Su, Mang (sumang@njust.edu.cn), 1600, Chinese Academy of Sciences (31): : 1563 - 1572