A 3-Level Re-Encryption Model to Ensure Data Protection in Cloud Computing Environments

被引:0
|
作者
Ahmadi, Mohammad [1 ]
Moghaddam, Faraz Fatemi [2 ]
Jam, Amid Jamshidi [2 ]
Gholizadeh, Somayyeh [2 ]
Eslami, Mohammad [3 ]
机构
[1] Asia Pacific Univ, Fac Comp, Kuala Lumpur, Malaysia
[2] UPM Univ, Fac Comp Sci & IT, Selangor, Malaysia
[3] Islamic Azad Univ Zahedan, Coll Engn, Dept Elect & Comp, Zahedan, Iran
来源
2014 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC 2014) | 2014年
关键词
Cloud Computing; Re-Encryption; Security; Data Classification; Cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ensuring about the security and privacy of stored data in cloud servers is one of the most challenging issues that decrease the rate of reliability in cloud computing environments. Applying cryptography algorithms is the most common solution to enhance the reliability of cloud servers and to protect resources from possible attacks and un-predictable events. However, the security of this type of protection is affected when some users are revoked by data owner from accessing to data. Hence, an efficient and reliable re-encryption model based on multi-level cryptography has been introduced in this paper to prevent un-authorized accesses from revoked users to cloud-based resources. The main aim of the proposed model is to classify data to several levels for managing the process of re-encryption more efficient and reliable. Therefore, 3 levels of security have been defined to carry out this classification according to the security characteristics of stored data: Time-Based Level, High Risk Level, and Custom Level. The presented model has been evaluated according to three parameters: performance, security, and scalability. The evaluation process was done by establishing a simulated environment to investigate functionality of re-encryption procedure in each level of security. Functionality and security analysis of this model shows that, the reliability and efficiency of data protection process in cloud computing environments is improved considerably by using 3level re-encryption model.
引用
收藏
页码:36 / 40
页数:5
相关论文
共 50 条
  • [31] A Hybrid Model Encryption for Enhancing Data Security in Cloud Computing
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 3840 - 3849
  • [32] A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing
    Yao, Shimao
    Dayot, Ralph Voltaire J.
    Kim, Hyung-Jin
    Ra, In-Ho
    IEEE ACCESS, 2021, 9 : 42801 - 42816
  • [33] POSTER: A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing
    Wu, Xiaoxin
    Xu, Lei
    Zhang, Xinwen
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 869 - 871
  • [34] Conditional Proxy Re-Encryption for Secure Big Data Group Sharing in Cloud Environment
    Son, Junggab
    Kim, Donghyun
    Hussain, Rasheed
    Oh, Heekuck
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 541 - 546
  • [35] Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing
    Eltayieb, Nabeil
    Elhabob, Rashad
    Abdelgader, Abdeldime M. S.
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
  • [36] Assured Update Scheme of Authorization for Cloud Data Access Based on Proxy Re-encryption
    Su M.
    Wu B.
    Fu A.-M.
    Yu Y.
    Zhang G.-X.
    Su, Mang (sumang@njust.edu.cn), 1600, Chinese Academy of Sciences (31): : 1563 - 1572
  • [37] Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    INFORMATION SCIENCES, 2014, 258 : 355 - 370
  • [38] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
    Luo, Wei
    Ma, Wenping
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 541 - 551
  • [39] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
    Wei Luo
    Wenping Ma
    Cluster Computing, 2019, 22 : 541 - 551
  • [40] A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption
    Zwattendorfer, Bernd
    Slamanig, Daniel
    Stranacher, Klaus
    Hoerandner, Felix
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 92 - 103