2016
DOI: 10.1016/j.pmcj.2015.06.017
|View full text |Cite
|
Sign up to set email alerts
|

Cloud based data sharing with fine-grained proxy re-encryption

Abstract: a b s t r a c tConditional proxy re-encryption (CPRE) enables fine-grained delegation of decryption rights, and has many real-world applications. In this paper, we present a ciphertext-policy attribute based CPRE scheme, together with a formalization of the primitive and its security analysis. We demonstrate the utility of the scheme in a cloud deployment, which achieves fine-grained data sharing. This application implements cloud server-enabled user revocation, offering an alternative yet more efficient solut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
5

Relationship

2
8

Authors

Journals

citations
Cited by 83 publications
(31 citation statements)
references
References 35 publications
(65 reference statements)
0
31
0
Order By: Relevance
“…Liu et al [17] proposed a time-based proxy re-encryption scheme, which allowed the cloud to automatically re-encrypt the ciphertexts based on time . Yang et al [28] presented a conditional proxy re-encryption scheme to achieve cloud-enabled user revocation. However, these previous schemes focused on how to revoke a specific user from the system rather than on updating of the attribute-based access policy in the ciphertext.…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…Liu et al [17] proposed a time-based proxy re-encryption scheme, which allowed the cloud to automatically re-encrypt the ciphertexts based on time . Yang et al [28] presented a conditional proxy re-encryption scheme to achieve cloud-enabled user revocation. However, these previous schemes focused on how to revoke a specific user from the system rather than on updating of the attribute-based access policy in the ciphertext.…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…Access Control allows one application to trust the identity of another application [29]. While a robust authentication technique is a compulsory requirement for any cloud project, access control cannot secure data at rest and in transit [30,31], and it is not satisfactory enough to achieve privacy for PHRs [32]. Encryption methods are definitely a better choice for protecting data at rest, as well as the choice for protecting data in transit [30].…”
Section: Related Workmentioning
confidence: 99%
“…To achieve finegrained data sharing in a cloud environment, one could deploy schemes such as ciphertext-policy attribute-based conditional proxy re-encryption [26] and online/offline attribute-based proxy http://dx.doi.org/10.1016/j.future.2016.04.017 0167-739X/ re-encryption [18]. In this special issue, Canard and Devigne [4] demonstrate how existing proxy re-encryption schemes can be modified in order for users to dynamically manage a tree structure for their shared document.…”
Section: Data Sharingmentioning
confidence: 99%