A 3-Level Re-Encryption Model to Ensure Data Protection in Cloud Computing Environments

被引:0
|
作者
Ahmadi, Mohammad [1 ]
Moghaddam, Faraz Fatemi [2 ]
Jam, Amid Jamshidi [2 ]
Gholizadeh, Somayyeh [2 ]
Eslami, Mohammad [3 ]
机构
[1] Asia Pacific Univ, Fac Comp, Kuala Lumpur, Malaysia
[2] UPM Univ, Fac Comp Sci & IT, Selangor, Malaysia
[3] Islamic Azad Univ Zahedan, Coll Engn, Dept Elect & Comp, Zahedan, Iran
来源
2014 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC 2014) | 2014年
关键词
Cloud Computing; Re-Encryption; Security; Data Classification; Cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ensuring about the security and privacy of stored data in cloud servers is one of the most challenging issues that decrease the rate of reliability in cloud computing environments. Applying cryptography algorithms is the most common solution to enhance the reliability of cloud servers and to protect resources from possible attacks and un-predictable events. However, the security of this type of protection is affected when some users are revoked by data owner from accessing to data. Hence, an efficient and reliable re-encryption model based on multi-level cryptography has been introduced in this paper to prevent un-authorized accesses from revoked users to cloud-based resources. The main aim of the proposed model is to classify data to several levels for managing the process of re-encryption more efficient and reliable. Therefore, 3 levels of security have been defined to carry out this classification according to the security characteristics of stored data: Time-Based Level, High Risk Level, and Custom Level. The presented model has been evaluated according to three parameters: performance, security, and scalability. The evaluation process was done by establishing a simulated environment to investigate functionality of re-encryption procedure in each level of security. Functionality and security analysis of this model shows that, the reliability and efficiency of data protection process in cloud computing environments is improved considerably by using 3level re-encryption model.
引用
收藏
页码:36 / 40
页数:5
相关论文
共 50 条
  • [1] A Reliable Data Protection Model based on Re-Encryption Concepts in Cloud Environments
    Moghaddam, Faraz Fatemi
    Vala, Mostafa
    Ahmadi, Mohammad
    Khodadadi, Touraj
    Madadipouya, Kasra
    2015 IEEE 6TH CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC), 2015, : 11 - 16
  • [2] A secure re-encryption scheme for data services in a cloud computing environment
    Xiong, Lizhi
    Xu, Zhengquan
    Xu, Yanyan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17): : 4573 - 4585
  • [3] VDCI: Variable Data Classification Index to Ensure Data Protection in Cloud Computing Environments
    Moghaddam, Faraz Fatemi
    Yezdanpanah, Moslem
    Khodadadi, Touraj
    Ahmadi, Mohammad
    Eslami, Mohammad
    2014 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC 2014), 2014, : 53 - 57
  • [4] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [5] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 624 - 651
  • [6] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Abdul Nasir Khan
    M. L. Mat Kiah
    Sajjad A. Madani
    Mazhar Ali
    Atta ur Rehman Khan
    Shahaboddin Shamshirband
    The Journal of Supercomputing, 2014, 68 : 624 - 651
  • [7] Secure multimedia distribution in cloud computing using re-encryption and fingerprinting
    Xiong, Lizhi
    Xia, Zhihua
    Chen, Xianyi
    Shim, Hiuk Jae
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (21) : 30297 - 30313
  • [8] Secure multimedia distribution in cloud computing using re-encryption and fingerprinting
    Lizhi Xiong
    Zhihua Xia
    Xianyi Chen
    Hiuk Jae Shim
    Multimedia Tools and Applications, 2019, 78 : 30297 - 30313
  • [9] A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
    Tang, Yongli
    Lian, Huanhuan
    Zhao, Zemao
    Yan, Xixi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02): : 339 - 352
  • [10] A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing
    Chen, Zhenhua
    Li, Shundong
    Guo, Yimin
    Wang, Yilei
    Chu, Yunjie
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 82 - 95