Data sharing using proxy re-encryption based on DNA computing

被引:0
作者
Ahmed Elhadad
机构
[1] South Valley University,Department of Mathematics and Computer Science, Faculty of Science
[2] Jouf University,Department of Computer Science and information, Faculty of Science and Art
来源
Soft Computing | 2020年 / 24卷
关键词
Proxy; Re-encryption; DNA; Security; Data sharing;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud data sharing allows users to access data stored on the web object. Security and protecting cloud data sharing form different attacks is recently considered one of the most challenges. In this paper, we are proposing a framework for cloud data sharing protection against unauthorized access. The proposed framework is based on DNA-proxy re-encryption. Firstly, three keys are generated for the owner, proxy and the user who need to access the data. Then, the owner stores his data encrypted on the cloud using his key. If the user wants to access this data then he can access it via the proxy after re-encrypting using the second generated key for the proxy. Finally, the user can decrypt the re-encrypted data with the third generated key. The framework was implemented using various plaintext files and real DNA sequences. The experimental results show that the framework has an outstanding performance in terms of execution time.
引用
收藏
页码:2101 / 2108
页数:7
相关论文
共 48 条
  • [1] Abualigah LM(2017)Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering J Supercomput 73 4773-58
  • [2] Khader AT(2018)Hybrid clustering analysis using improved krill herd algorithm Appl Intell 48 4047-undefined
  • [3] Abualigah LM(2016)A study of cyber security awareness in educational environment in the middle east J Inf Knowl Manag 15 1650007-undefined
  • [4] Khader AT(2019)Evaluation prediction techniques to achieve optimal biomedical analysis Int J Grid Util Comput (IJGUC) 18 113-undefined
  • [5] Hanandeh ES(2017)Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications Egypt Inform J 9 1-undefined
  • [6] Al-Janabi S(2006)Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans Inf Syst Secur (TISSEC) 53 50-undefined
  • [7] Al-Shourbaji I(2010)A view of cloud computing Commun ACM 29 1195-undefined
  • [8] Al-Janabi S(2018)Mixed-effects modeling for tree height prediction models of Oriental beech in the Hyrcanian forests J For Res 8 218-undefined
  • [9] Mahdi MA(2017)A proxy re-encryption scheme based on elliptic curve group J Inf Hiding Multimed Signal Process 49 107-undefined
  • [10] Al-Janabi S(2015)A novel methodology towards a trusted environment in mashup web applications Comput Secur 20 14-undefined