A secure re-encryption scheme for data services in a cloud computing environment

被引:19
作者
Xiong, Lizhi [1 ]
Xu, Zhengquan [1 ]
Xu, Yanyan [1 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud data services; data security; re-encryption; untrusted cloud service provider; cloud computing; PROXY; STORAGE;
D O I
10.1002/cpe.3423
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing as a promising technology and paradigm can provide various data services, such as data sharing and distribution, which allows users to derive benefits without the need for deep knowledge about them. However, the popular cloud data services also bring forth many new data security and privacy challenges. Cloud service provider untrusted, outsourced data security, hence collusion attacks from cloud service providers and data users become extremely challenging issues. To resolve these issues, we design the basic parts of secure re-encryption scheme for data services in a cloud computing environment, and further propose an efficient and secure re-encryption algorithm based on the EIGamal algorithm, to satisfy basic security requirements. The proposed scheme not only makes full use of the powerful processing ability of cloud computing but also can effectively ensure cloud data security. Extensive analysis shows that our proposed scheme is highly efficient and provably secure under existing security model. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:4573 / 4585
页数:13
相关论文
共 50 条
  • [41] Trusted secure model for data services in cloud computing
    Xu, Zheng-Quan, 1600, Editorial Board of Journal on Communications (35): : 127 - 137and144
  • [42] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02): : 254 - 259
  • [43] A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
    Guijiang Liu
    Haibo Xie
    Wenming Wang
    Haiping Huang
    Journal of Cloud Computing, 13
  • [44] A Reliable Data Protection Model based on Re-Encryption Concepts in Cloud Environments
    Moghaddam, Faraz Fatemi
    Vala, Mostafa
    Ahmadi, Mohammad
    Khodadadi, Touraj
    Madadipouya, Kasra
    2015 IEEE 6TH CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC), 2015, : 11 - 16
  • [45] A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
    Liu, Guijiang
    Xie, Haibo
    Wang, Wenming
    Huang, Haiping
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [46] A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
    Li, Juyan
    Qiao, Zhiqi
    Zhang, Kejia
    Cui, Chen
    SENSORS, 2021, 21 (01) : 1 - 20
  • [47] A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems
    Muthukumaran, V
    Ezhilmaran, D.
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2020, 15 (04) : 18 - 36
  • [48] A pairing-free proxy re-encryption scheme suitable for cloud medical information systems
    Zhou, Han
    Deng, Lunzhi
    Wu, Yaying
    Zhou, Sihua
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [49] Obfuscation for multi-use re-encryption and its application in cloud computing
    Cheng, Rong
    Zhang, Fangguo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) : 2170 - 2190
  • [50] Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
    Tang X.
    Zhou L.
    Shan W.
    Liu D.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (06): : 98 - 111