2016
DOI: 10.1002/cpe.3946
|View full text |Cite
|
Sign up to set email alerts
|

A new outsourcing conditional proxy re‐encryption suitable for mobile cloud environment

Abstract: Summary The mobile cloud is a highly heterogenous and constantly evolving network of numerous portable devices utilizing the powerful back‐end cloud infrastructure to overcome their severe deficiency in computing resource and offer various services such as data sharing. Inherently, in mobile cloud, the risk of user privacy invasion by the cloud operator is high. The conditional proxy re‐encryption (CPRE) is a useful concept for secure group data sharing via cloud while preserving the privacy of the shared data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…A re-encryption scheme [133] may use two or more encryption operations to provide authentication or update the access rules [132]. Mangili et al [79] design an encryption-based extension for ICN.…”
Section: Re-encryption-based Access Controlmentioning
confidence: 99%
“…A re-encryption scheme [133] may use two or more encryption operations to provide authentication or update the access rules [132]. Mangili et al [79] design an encryption-based extension for ICN.…”
Section: Re-encryption-based Access Controlmentioning
confidence: 99%
“…There exist very few studies in this context to combat such threats. In [26,13,14,27], the authors conclude that data streams stored at the network edge are more vulnerable to threats in comparison to their storage at the cloud. To prevent such threats, differential privacy need to be used to protect users' privacy at the edge.…”
Section: Related Workmentioning
confidence: 99%
“…Son et al introduced a new conditional proxy re‐encryption (CPRE) scheme, namely, the CPRE for Mobile Cloud (CPRE‐M), which utilizes the back‐end cloud to the extreme extent so that the overhead of terminals is drastically reduced. The scheme outsources a significant amount of computation overhead caused by re‐encryption key generation, condition value change, and decryption, to the cloud.…”
Section: Themes Of This Special Issuementioning
confidence: 99%