• DocumentCode
    686406
  • Title

    Re-encryption security model over outsourced cloud data

  • Author

    Lizhi Xiong ; Zhengquan Xu

  • Author_Institution
    State Key Lab. of Inf. Eng. in Surveying, Mapping & Remote Sensing, Wuhan Univ., Wuhan, China
  • fYear
    2013
  • fDate
    22-24 Nov. 2013
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    Cloud computing is recommended as a promising technology, which delivers computational facilities as services to users over the Internet. As well as, the cloud computing brings significant risks for greater exposure to data security when users outsource sensitive data for sharing on cloud servers. To keep sensitive data confidentiality against untrusted cloud service provider, this paper discusses this challenging open issue using re-encryption scheme in outsourced cloud data. On the one hand, it allows the data owner to delegate most of the computation tasks to untrusted cloud servers providers without the need to have knowledge of the underlying plain texts. On the other hand, it employs double cryptographic methods to limit authorized users accessing updated cloud data with expired keys. This paper also obtains the restrictions of choosing appropriate encryption algorithm to establish secure re-encryption scheme in cloud data services.
  • Keywords
    cloud computing; cryptography; data privacy; outsourcing; Internet; cloud computing; cloud servers; data privacy; data security; double cryptographic methods; outsourced cloud data services; re-encryption security model; sensitive data confidentiality; sensitive data outsourcing; untrusted cloud service provider; cloud computing; data privacy; outsourced cloud data security; re-encryption;
  • fLanguage
    English
  • Publisher
    iet
  • Conference_Titel
    Information and Network Security (ICINS 2013), 2013 International Conference on
  • Conference_Location
    Beijing
  • Electronic_ISBN
    978-1-84919-729-8
  • Type

    conf

  • DOI
    10.1049/cp.2013.2473
  • Filename
    6826022