A 3-Level Re-Encryption Model to Ensure Data Protection in Cloud Computing Environments

被引:0
|
作者
Ahmadi, Mohammad [1 ]
Moghaddam, Faraz Fatemi [2 ]
Jam, Amid Jamshidi [2 ]
Gholizadeh, Somayyeh [2 ]
Eslami, Mohammad [3 ]
机构
[1] Asia Pacific Univ, Fac Comp, Kuala Lumpur, Malaysia
[2] UPM Univ, Fac Comp Sci & IT, Selangor, Malaysia
[3] Islamic Azad Univ Zahedan, Coll Engn, Dept Elect & Comp, Zahedan, Iran
来源
2014 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC 2014) | 2014年
关键词
Cloud Computing; Re-Encryption; Security; Data Classification; Cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ensuring about the security and privacy of stored data in cloud servers is one of the most challenging issues that decrease the rate of reliability in cloud computing environments. Applying cryptography algorithms is the most common solution to enhance the reliability of cloud servers and to protect resources from possible attacks and un-predictable events. However, the security of this type of protection is affected when some users are revoked by data owner from accessing to data. Hence, an efficient and reliable re-encryption model based on multi-level cryptography has been introduced in this paper to prevent un-authorized accesses from revoked users to cloud-based resources. The main aim of the proposed model is to classify data to several levels for managing the process of re-encryption more efficient and reliable. Therefore, 3 levels of security have been defined to carry out this classification according to the security characteristics of stored data: Time-Based Level, High Risk Level, and Custom Level. The presented model has been evaluated according to three parameters: performance, security, and scalability. The evaluation process was done by establishing a simulated environment to investigate functionality of re-encryption procedure in each level of security. Functionality and security analysis of this model shows that, the reliability and efficiency of data protection process in cloud computing environments is improved considerably by using 3level re-encryption model.
引用
收藏
页码:36 / 40
页数:5
相关论文
共 50 条
  • [21] Obfuscation for multi-use re-encryption and its application in cloud computing
    Cheng, Rong
    Zhang, Fangguo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) : 2170 - 2190
  • [22] Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique
    Adilakshmi, Jyothi
    Rithika, Badgoian
    Pushpalatha, Chitikela
    Venkatesh, Thurpati
    Lohitha, Mandapati
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 700 - 705
  • [23] Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing
    Qin, Zhiguang
    Wu, Shikun
    Xiong, Hu
    BIG DATA COMPUTING AND COMMUNICATIONS, 2015, 9196 : 205 - 216
  • [24] Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing
    Yue, Na
    Wang, Yang
    Wang, Mingqiang
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 264 - 269
  • [25] PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing
    Su, Mang
    Wang, Liangchen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2754 - 2767
  • [26] A real-time parking service with proxy re-encryption in vehicular cloud computing
    Lin, Iuon-Chang
    Cheng, Chen-Yang
    Chen, Hsiang-Yu
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2019, 85 : 208 - 213
  • [27] Anonymous attribute-based proxy re-encryption for access control in cloud computing
    Zhang, Yinghui
    Li, Jin
    Chen, Xiaofeng
    Li, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2397 - 2411
  • [28] Cloud based data sharing with fine-grained proxy re-encryption
    Yang, Yanjiang
    Zhu, Haiyan
    Lu, Haibing
    Weng, Jian
    Zhang, Youcheng
    Choo, Kim-Kwang Raymond
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 122 - 134
  • [29] Enriched cloud computing data security through a triple level encryption model for healthcare systems
    Kanagaraj, Hari Priya
    Christo, Brintha Nalsingh
    International Journal of Cloud Computing, 2024, 13 (06) : 566 - 580
  • [30] Enhanced Timing Enabled Proxy Re-Encryption Model for E-Health Data in the Public Cloud
    Bhateja, Richa
    Saxena, Naman
    Acharjya, Debi Prasanna
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 2040 - 2044