A 3-Level Re-Encryption Model to Ensure Data Protection in Cloud Computing Environments

被引:0
|
作者
Ahmadi, Mohammad [1 ]
Moghaddam, Faraz Fatemi [2 ]
Jam, Amid Jamshidi [2 ]
Gholizadeh, Somayyeh [2 ]
Eslami, Mohammad [3 ]
机构
[1] Asia Pacific Univ, Fac Comp, Kuala Lumpur, Malaysia
[2] UPM Univ, Fac Comp Sci & IT, Selangor, Malaysia
[3] Islamic Azad Univ Zahedan, Coll Engn, Dept Elect & Comp, Zahedan, Iran
来源
2014 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC 2014) | 2014年
关键词
Cloud Computing; Re-Encryption; Security; Data Classification; Cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ensuring about the security and privacy of stored data in cloud servers is one of the most challenging issues that decrease the rate of reliability in cloud computing environments. Applying cryptography algorithms is the most common solution to enhance the reliability of cloud servers and to protect resources from possible attacks and un-predictable events. However, the security of this type of protection is affected when some users are revoked by data owner from accessing to data. Hence, an efficient and reliable re-encryption model based on multi-level cryptography has been introduced in this paper to prevent un-authorized accesses from revoked users to cloud-based resources. The main aim of the proposed model is to classify data to several levels for managing the process of re-encryption more efficient and reliable. Therefore, 3 levels of security have been defined to carry out this classification according to the security characteristics of stored data: Time-Based Level, High Risk Level, and Custom Level. The presented model has been evaluated according to three parameters: performance, security, and scalability. The evaluation process was done by establishing a simulated environment to investigate functionality of re-encryption procedure in each level of security. Functionality and security analysis of this model shows that, the reliability and efficiency of data protection process in cloud computing environments is improved considerably by using 3level re-encryption model.
引用
收藏
页码:36 / 40
页数:5
相关论文
共 50 条
  • [41] A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
    Li, Juyan
    Qiao, Zhiqi
    Zhang, Kejia
    Cui, Chen
    SENSORS, 2021, 21 (01) : 1 - 20
  • [42] Implementing the Triple-Data Encryption Standard for Secure and Efficient Healthcare Data Storage in Cloud Computing Environments
    Awadh W.A.
    Hashim M.S.
    Alasady A.S.
    Informatica (Slovenia), 2024, 48 (06): : 173 - 184
  • [43] A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems
    Muthukumaran, V
    Ezhilmaran, D.
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2020, 15 (04) : 18 - 36
  • [44] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 398 - 405
  • [45] CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud
    Xu, Lei
    Wu, Xiaoxin
    Zhang, Xinwen
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [46] Highly Efficient Proxy Re-Encryption Schemes for User-End Encrypted Cloud Data Sharing
    Hu, Xing
    Tang, Chunming
    Wong, Duncan S.
    2016 15TH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING (ISPDC), 2016, : 261 - 268
  • [47] Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage
    Jiang, Linmei
    Guo, Donghui
    IEEE ACCESS, 2017, 5 : 13336 - 13345
  • [48] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
    Wang L.-L.
    Chen K.-F.
    Mao X.-P.
    Wang Y.-T.
    Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405
  • [49] Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
    Tang X.
    Zhou L.
    Shan W.
    Liu D.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (06): : 98 - 111
  • [50] Improvement of Cloud Computing Medical Data Protection Technology Based on Symmetric Encryption Algorithm
    Zhao, Nannan
    JOURNAL OF TESTING AND EVALUATION, 2023, 51 (01) : 366 - 381