scispace - formally typeset
Proceedings ArticleDOI

Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds

TLDR
A clock-based proxy re-encryption (C-PRE) scheme to achieve fine-grained access control and scalable user revocation in unreliable clouds and allows the data owner and the cloud to share a secret key in advance.
Abstract
In this paper, we propose a clock-based proxy re-encryption (C-PRE) scheme to achieve fine-grained access control and scalable user revocation in unreliable clouds. Our scheme, which is built on top of cipher text-policy attribute-based encryption (CP-ABE) and proxy re-encryption (PRE), allows the data owner and the cloud to share a secret key in advance, with which the cloud can be delegated to re-encrypt data on behalf of the data owner. The main merit of our scheme is that the cloud can automatically re-encrypt data based on its internal clock without receiving any command.

read more

Citations
More filters
Journal ArticleDOI

Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds

TL;DR: Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes such that the higher computational load from cryptographic operations is assigned to the cloud provider and the total communication cost is lowered for the mobile user.
Book ChapterDOI

Secure Data Sharing in the Cloud

TL;DR: Cloud systems can be used to enable data sharing capabilities and this can provide an abundant of benefits to the user.
Journal ArticleDOI

Anonymous attribute-based proxy re-encryption for access control in cloud computing

TL;DR: This paper formalizes the notion of anonymous ciphertext-policy attribute-based proxy re-encryption anonymous CP-ABPRE and proposes a novel technique called match-then-re-encrypt, in which a matching phase is additionally introduced before the re- Encryption phase.
Journal ArticleDOI

Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs

TL;DR: This research focuses on securing the entire process of data migration to cloud from devices while the in‐cloud data flow is monitored by the Information Flow Control policies specified by the users.
Journal ArticleDOI

Towards Secure Data Distribution Systems in Mobile Cloud Computing

TL;DR: This paper uses several cryptographic primitives such as a new type-based proxy re-encryption to design a secure and efficient data distribution system in MCC, which provides data privacy, data integrity, data authentication, and flexible data distribution with access control.
References
More filters
Journal ArticleDOI

A view of cloud computing

TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Journal ArticleDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Book ChapterDOI

Divertible protocols and atomic proxy cryptography

TL;DR: A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.
Proceedings ArticleDOI

Hierarchical attribute-based encryption for fine-grained access control in cloud storage services

TL;DR: This paper proposes a scheme to help enterprises to efficiently share confidential data on cloud servers by first combining the HIBE system and the ciphertext-policy attribute-based encryption (CP-ABE) system, and then making a performance-expressivity tradeoff.
Related Papers (5)