A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment

نویسندگان

  • Yilei Wang
  • Dongjie Yan
  • Fagen Li
  • Hu Xiong
چکیده

Proxy re-encryption (PRE) enables a semi-trusted proxy to delegate the decryption right by re-encrypting the ciphertext under the delegator’s public key to an encryption under the public key of delegatee. Fueled by the translation ability, PRE is regarded as a promising candidate to secure data sharing in a cloud environment. However, the security of the PRE will be totally destroyed in case the secret key of the delegator or the delegatee has been exposed. Despite the key exposure seems inevitable, the PRE scheme with resistance against secret key leakage has never been presented before. To deal with this intractable problem, we propose a key-insulated proxy reencryption (KIPRE) scheme by incorporating the mechanisms of PRE and key-insulated cryptosystem. In the proposed scheme, the lifetime of the secret key associated with the user, i.e., the delegator or the delegatee, has been divided into several periods. In each time period, the user can interact with his/her physically-secure but computation-limited helper to update his/her temporary secret key. On the contrary, the public keys of the users remained unchanged during the whole lifetime of the system. We then apply our KIPRE scheme to construct a practical solution to the problem of sharing sensitive information in public clouds with resilience to the key exposure. The performance evaluation and the security analysis demonstrate that our scheme is efficient and practical.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Achieving Scalable and Optimized Attribute Revocation in Cloud Computing

Revocation is one of the major problems for access control systems. Especially, the revocation cost for the data outsourced in the third party environment such as cloud storage systems. The revocation in the cloud-based access control typically deals with the cryptographic operations that introduce costly overheads for key re-generation, file reencryption, and key re-distribution. Also, the com...

متن کامل

A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption

In the process of cloud data storage, data owner will encrypt data and upload it to the cloud, however, this method cannot support for encrypted data sharing. Especially, when data is shared with many users, the scalability is very weak. In order to solve this problem, we put forward a new security cloud storage data encryption scheme based on identity proxy re-encryption in this article. This ...

متن کامل

A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment

The mobile cloud is a highly heterogenous and constantly evolving network of numerous portable devices utilizing the powerful back-end cloud infrastructure to overcome their severe deficiency in computing resource and offer various services such as data sharing. Inherently, in mobile cloud, the risk of user privacy invasion by the cloud operator is high. The conditional proxy re-encryption (CPR...

متن کامل

Multi-Owner Data Sharing Using Key Policy Attribute-Based Encryption Method in the cloud

There is a Major problem in public clouds about the sharing of documents on attribute based policies, sharing data in a dynamic groups . With the help of advantage of low maintenance, cloud computing gives the effective solution for sharing group resource among cloud users. As the sharing of documents with different keys like attribute based encryption (ABE), and/or proxy re-encryption (PRE) ap...

متن کامل

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage

Cloud storage is provided as a service in order to keep pace with the increasing use of digital information. It can be used to store data via networks and various devices and is easy to access. Unlike existing removable storage, many users can use cloud storage because it has no storage capacity limit and does not require a storage medium. Cloud storage reliability has become a topic of importa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2017