Title :
Verifiable El-gamal re-encryption with authenticity in cloud
Author :
Renjith, P. ; Sabitha, S.
Author_Institution :
Dept. of Comput. Sci., Coll. of Eng., Trivandrum, India
Abstract :
Now a days data centers are migrating to the cloud. Security concerns become relevant as we outsource the storage of possibly sensitive data to third party cloud. Data stored in cloud need to be secured so that any malicious attacker colluding with any of the cloud servers does not gain any access to the secure information. Data need to be secured not only in the storage but also in the transit among authorized users. For secure data storage, encryption of the data is done using a powerful encryption mechanism. Encrypted data need to be shared among authorized clients. This is made possible through re-encryption. The re-encryption process converts the cipher text encrypted under the public key of owner of the data to a different cipher text encrypted under the intended receiver´s public key. Automatic re-encryption done too frequently will lead to wastage of resources. Existing Re-encryption algorithms shares their secret keys as shares in key servers. The re-encrypting authority should never get any information about the secret keys or the plain text during the process. The re-encryption is secure only if it does not reveal plain text in any of its intermediate stages. In the proposed method a novel re-encryption scheme is introduced that is secure against the collusion attacks and the re-encryption process does not reveal the plain text and secret keys anywhere in the middle of the process. The proposed method re-encrypts data only on demand thereby ensuring efficient resource utilization.
Keywords :
cloud computing; message authentication; public key cryptography; storage management; cipher text; cloud computing; cloud servers; collusion attacks; data centers; data encryption mechanism; data storage; malicious attacker; plain text; receiver public key cryptography; secret keys; third party cloud; verifiable El-gamal re-encryption algorithms; Cloud computing; Encryption; Protocols; Public key; Servers;
Conference_Titel :
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location :
Tiruchengode
Print_ISBN :
978-1-4799-3925-1
DOI :
10.1109/ICCCNT.2013.6726834