Multi-security-level cloud storage system based on improved proxy re-encryption

被引:13
|
作者
Shen, Jinan [1 ,2 ]
Deng, Xuejian [1 ]
Xu, Zhenwu [1 ]
机构
[1] Hubei Minzu Univ, Sch Informat Engn, Xueyuan Rd, Enshi 445000, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Luoyu Rd 1037, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy preserving; Proxy re-encryption; Fine-grained; Cloud storage; ACCESS-CONTROL; RECOMMENDATION;
D O I
10.1186/s13638-019-1614-y
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Based on the characteristics and data security requirements of the cloud environment, we present a scheme for a multi-security-level cloud storage system that is combined with AES symmetric encryption and an improved identity-based proxy re-encryption (PRE) algorithm. Our optimization includes support for fine-grained control and performance optimization. Through a combination of attribute-based encryption methods, we add a fine-grained control factor to our algorithm in which each authorization operation is only valid for a single factor. By reducing the number of bilinear mappings, which are the most time-consuming processes, we achieve our aim of optimizing performance. Last but not least, we implement secure data sharing among heterogeneous cloud systems. As shown in experiment, our proposed multi-security-level cloud storage system implements services such as the direct storage of data, transparent AES encryption, PRE protection that supports fine-grained and ciphertext heterogeneous transformation, and other functions such as authentication and data management. In terms of performance, we achieve time-cost reductions of 29.8% for the entire process, 48.3% for delegation and 47.2% for decryption.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud
    苏铓
    汪良辰
    付安民
    俞研
    Journal of Shanghai Jiaotong University(Science), 2018, 23 (05) : 666 - 670
  • [22] Multi-element based on proxy re-encryption scheme for mobile cloud computing
    School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing
    210094, China
    不详
    100070, China
    Tongxin Xuebao, 11
  • [23] Proxy re-encryption based multi-factor access control scheme in cloud
    Su M.
    Shi G.
    Fu A.
    Yu Y.
    Jin W.
    Tongxin Xuebao/Journal on Communications, 2018, 39 (02): : 93 - 101
  • [24] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [25] Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
    Xu, Peng
    Chen, Hongwu
    Zou, Deqing
    Jin, Hai
    CHINESE SCIENCE BULLETIN, 2014, 59 (32): : 4201 - 4209
  • [26] Improved Proxy Re-Encryption With Delegatable Verifiability
    Zhan, Yu
    Wang, Baocang
    Wang, Zheng
    Pei, Tao
    Chen, Yuan
    Qu, Quanbo
    Zhang, Zhili
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 592 - 602
  • [27] Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing
    Wang, Xu An
    Nedjah, Nadia
    Sangaiah, Arun Kumar
    Shan, Chun
    Wang, Zuliang
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 3PGCIC-2018, 2019, 24 : 478 - 485
  • [28] Semantic keyword searchable proxy re-encryption for postquantum secure cloud storage
    Yang, Yang
    Zheng, Xianghan
    Chang, Victor
    Tang, Chunming
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [29] Fine-Grained Access Control Scheme Based on Improved Proxy Re-Encryption in Cloud
    Xu, Zhenwu
    Shen, Jinan
    Liang, Fang
    Chen, Yingjie
    JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2021, 25 (02) : 170 - 176
  • [30] Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing
    Wang, Xu An
    Yang, Xiaoyuan
    Li, Cong
    Liu, Yudong
    Ding, Yong
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2018, 15 (03) : 585 - 614