Multi-security-level cloud storage system based on improved proxy re-encryption

被引:13
|
作者
Shen, Jinan [1 ,2 ]
Deng, Xuejian [1 ]
Xu, Zhenwu [1 ]
机构
[1] Hubei Minzu Univ, Sch Informat Engn, Xueyuan Rd, Enshi 445000, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Luoyu Rd 1037, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy preserving; Proxy re-encryption; Fine-grained; Cloud storage; ACCESS-CONTROL; RECOMMENDATION;
D O I
10.1186/s13638-019-1614-y
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Based on the characteristics and data security requirements of the cloud environment, we present a scheme for a multi-security-level cloud storage system that is combined with AES symmetric encryption and an improved identity-based proxy re-encryption (PRE) algorithm. Our optimization includes support for fine-grained control and performance optimization. Through a combination of attribute-based encryption methods, we add a fine-grained control factor to our algorithm in which each authorization operation is only valid for a single factor. By reducing the number of bilinear mappings, which are the most time-consuming processes, we achieve our aim of optimizing performance. Last but not least, we implement secure data sharing among heterogeneous cloud systems. As shown in experiment, our proposed multi-security-level cloud storage system implements services such as the direct storage of data, transparent AES encryption, PRE protection that supports fine-grained and ciphertext heterogeneous transformation, and other functions such as authentication and data management. In terms of performance, we achieve time-cost reductions of 29.8% for the entire process, 48.3% for delegation and 47.2% for decryption.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Hierarchical Attribute Based Proxy Re-Encryption Access Control in Cloud Computing
    Chandar, P. Praveen
    Muthuraman, D.
    Rathinraj, M.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1565 - 1570
  • [42] A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
    Tang, Yongli
    Lian, Huanhuan
    Zhao, Zemao
    Yan, Xixi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02): : 339 - 352
  • [43] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +
  • [44] Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
    Purushothama, B.R.
    Shrinath, B.
    Amberker, B.B.
    International Journal of Information and Communication Technology, 2013, 5 (02) : 167 - 186
  • [45] NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems
    徐小龙
    张栖桐
    周静岚
    Journal of Central South University, 2017, 24 (04) : 807 - 818
  • [46] NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems
    Xiao-long Xu
    Qi-tong Zhang
    Jing-lan Zhou
    Journal of Central South University, 2017, 24 : 807 - 818
  • [47] A CP-ABE Scheme with Cloud Proxy Re-Encryption
    Zhao K.-Q.
    Kang P.
    Liu B.
    Guo Z.
    Feng C.-S.
    Qing Y.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (03): : 728 - 735
  • [48] MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devices
    Maiti, Sumana
    Misra, Sudip
    Mondal, Ayan
    COMPUTER COMMUNICATIONS, 2024, 214 : 57 - 66
  • [49] Multi-use Unidirectional Proxy Re-Encryption
    Shao, Jun
    Liu, Peng
    Cao, Zhenfu
    Wei, Guiyi
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [50] Multi-key Homomorphic Proxy Re-Encryption
    Yasuda, Satoshi
    Koseki, Yoshihiro
    Hiromasa, Ryo
    Kawai, Yutaka
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 328 - 346