An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services

被引:5
作者
Sharma, Sumit [1 ]
Swarnakar, Ashutosh [1 ]
Babu, Ch Jayanth [1 ]
Padmavathy, R. [1 ]
Kumar, Rakesh [1 ]
机构
[1] NIT Warangal, Dept Comp Sci Engn, Warangal 506004, Telangana, India
来源
PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020) | 2020年
关键词
conditional proxy re-encryption; hierarchical conditional proxy re-encryption; keyword search; proxy re-encryption; SECURE;
D O I
10.1109/icccs49678.2020.9277095
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet and mobile platform together are playing a vital role in making people to keep and manage their data conveniently using cloud services. This made cloud servers to manage larger volume of data where data confidentiality has to be taken into consideration. The major issue is to overcome the tradeoff between satisfactory mobility and security and privacy in cloud environment. A long time the researches in this field focused on encryption and decryption techniques to protect data owners' privacy and data confidentiality. These encryption and decryption techniques made another essential requirement to be focused such as searching on encrypted data. This leads to the evolution of techniques for searching on encrypted data. Further in another direction conditional proxy re-encryption scheme where cipher text satisfying certain keyword vector set determined by the owner can be re-encrypted by a proxy server started getting attention. However, the combination of both searching and hierarchical conditional proxy re-encryption has been attempted recently. In this paper the above scheme is analyzed and proved that the data owner authentication offered by the scheme is fails to satisfy the requirement of authentication property. Additionally an extended version of the scheme is proposed which ensures data owner authentication. The proposed scheme is analyzed and proved based on widely used BAN logic and AVISPA.
引用
收藏
页数:8
相关论文
共 17 条
  • [1] [Anonymous], 2010, INFOCOM, 2010 Proceedings IEEE, DOI DOI 10.1109/INFCOM.2010.5462196
  • [2] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [3] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [4] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [5] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
  • [6] Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189
  • [7] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [8] Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
  • [9] A Searchable Hierarchical Conditional Proxy Re-Encryption Scheme for Cloud Storage Services
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chin-Ling
    Chiu, Shih-Ting
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 289 - 299
  • [10] Libert B, 2008, LECT NOTES COMPUT SC, V4939, P360, DOI 10.1007/978-3-540-78440-1_21