Multi-security-level cloud storage system based on improved proxy re-encryption

被引:13
|
作者
Shen, Jinan [1 ,2 ]
Deng, Xuejian [1 ]
Xu, Zhenwu [1 ]
机构
[1] Hubei Minzu Univ, Sch Informat Engn, Xueyuan Rd, Enshi 445000, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Luoyu Rd 1037, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy preserving; Proxy re-encryption; Fine-grained; Cloud storage; ACCESS-CONTROL; RECOMMENDATION;
D O I
10.1186/s13638-019-1614-y
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Based on the characteristics and data security requirements of the cloud environment, we present a scheme for a multi-security-level cloud storage system that is combined with AES symmetric encryption and an improved identity-based proxy re-encryption (PRE) algorithm. Our optimization includes support for fine-grained control and performance optimization. Through a combination of attribute-based encryption methods, we add a fine-grained control factor to our algorithm in which each authorization operation is only valid for a single factor. By reducing the number of bilinear mappings, which are the most time-consuming processes, we achieve our aim of optimizing performance. Last but not least, we implement secure data sharing among heterogeneous cloud systems. As shown in experiment, our proposed multi-security-level cloud storage system implements services such as the direct storage of data, transparent AES encryption, PRE protection that supports fine-grained and ciphertext heterogeneous transformation, and other functions such as authentication and data management. In terms of performance, we achieve time-cost reductions of 29.8% for the entire process, 48.3% for delegation and 47.2% for decryption.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] A proxy broadcast re-encryption for cloud data sharing
    Maosheng Sun
    Chunpeng Ge
    Liming Fang
    Jiandong Wang
    Multimedia Tools and Applications, 2018, 77 : 10455 - 10469
  • [42] DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES
    Lo, Mamadou Makhtar
    Sow, Demba
    Ben Maaouia, Mohamed
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2024, 63 (01): : 1 - 21
  • [43] Proxy Re-Encryption Scheme for Decentralized Storage Networks
    Kan, Jia
    Zhang, Jie
    Liu, Dawei
    Huang, Xin
    APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [44] Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage
    Jiang, Linmei
    Guo, Donghui
    IEEE ACCESS, 2017, 5 : 13336 - 13345
  • [45] Verifiable and hybrid attribute-based proxy re-encryption for flexible data sharing in cloud storage
    Sun, Lixue
    Xu, Chunxiang
    Zeng, Fugeng
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 193
  • [46] Improved Proxy Re-encryption Scheme with Equality Test
    Yang, Chih-Chen
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    Tseng, Yi-Fan
    2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 37 - 44
  • [47] OBC Based Optimization of Re-encryption for Cryptographic Cloud Storage
    Qiao, Huidong
    Ren, Jiangchun
    Wang, Zhiying
    Ba, Haihe
    Zhou, Huaizhe
    Hong, Tie
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016, 2016, 10048 : 586 - 595
  • [48] Hierarchical Identity Role based proxy re-encryption scheme for cloud computing
    Nirmala, V
    Shanmugalakshmi, R.
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,
  • [49] Hierarchical Attribute Based Proxy Re-Encryption Access Control in Cloud Computing
    Chandar, P. Praveen
    Muthuraman, D.
    Rathinraj, M.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1565 - 1570
  • [50] Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
    Purushothama, B.R.
    Shrinath, B.
    Amberker, B.B.
    International Journal of Information and Communication Technology, 2013, 5 (02) : 167 - 186