A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing

被引:7
作者
Tang, Yongli [1 ]
Lian, Huanhuan [1 ]
Zhao, Zemao [2 ]
Yan, Xixi [1 ]
机构
[1] Henan Polytech Univ, Coll Comp Sci & Technol, Jiaozuo 454000, Peoples R China
[2] Lishui Univ, Sch Engn, Lishui 323000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2018年 / 56卷 / 02期
关键词
Cloud computing; keyword search; proxy re-encryption; provable security;
D O I
10.3970/cmc.2018.02965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of cloud computing technology, more and more users and enterprises decide to store their data in a cloud server by outsourcing. However, these huge amounts of data may contain personal privacy, business secrets and other sensitive information of the users and enterprises. Thus, at present, how to protect, retrieve, and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment. A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server. In this scheme, the user data are divided into files, file indexes and the keyword corresponding to the files, which are respectively encrypted to store. The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes, but re-encrypt the cipher-text of keywords corresponding to the files. Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack. And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption. Furthermore, the scheme does not need to use any secure channels, making it more effective in the cloud environment.
引用
收藏
页码:339 / 352
页数:14
相关论文
共 50 条
  • [41] A Timed-Release Proxy Re-Encryption Scheme
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (08) : 1682 - 1695
  • [42] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [43] A proxy broadcast re-encryption for cloud data sharing
    Maosheng Sun
    Chunpeng Ge
    Liming Fang
    Jiandong Wang
    Multimedia Tools and Applications, 2018, 77 : 10455 - 10469
  • [44] Proxy Re-Encryption Scheme for Decentralized Storage Networks
    Kan, Jia
    Zhang, Jie
    Liu, Dawei
    Huang, Xin
    APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [45] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
    Devigne, Julien
    Guerrini, Eleonora
    Laguillaumie, Fabien
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
  • [46] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Nitish Raghav
    Katyayani Andola
    S. Verma
    Shekhar Venkatesan
    The Journal of Supercomputing, 2023, 79 : 14117 - 14145
  • [47] A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems
    Muthukumaran, V
    Ezhilmaran, D.
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2020, 15 (04) : 18 - 36
  • [48] CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud
    Xu, Lei
    Wu, Xiaoxin
    Zhang, Xinwen
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [49] Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud
    Lian, Zheng
    Su, Mang
    Fu, Anmin
    Wang, Huaqun
    Thou, Chunyi
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [50] A Multi-users Searchable Encryption Scheme with Proxy Re-encryption
    Zhang Ya-ling
    Liu Kai
    Wang Shang-ping
    Sun Qin-dong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 563 - 567