DocumentCode :
686406
Title :
Re-encryption security model over outsourced cloud data
Author :
Lizhi Xiong ; Zhengquan Xu
Author_Institution :
State Key Lab. of Inf. Eng. in Surveying, Mapping & Remote Sensing, Wuhan Univ., Wuhan, China
fYear :
2013
fDate :
22-24 Nov. 2013
Firstpage :
1
Lastpage :
5
Abstract :
Cloud computing is recommended as a promising technology, which delivers computational facilities as services to users over the Internet. As well as, the cloud computing brings significant risks for greater exposure to data security when users outsource sensitive data for sharing on cloud servers. To keep sensitive data confidentiality against untrusted cloud service provider, this paper discusses this challenging open issue using re-encryption scheme in outsourced cloud data. On the one hand, it allows the data owner to delegate most of the computation tasks to untrusted cloud servers providers without the need to have knowledge of the underlying plain texts. On the other hand, it employs double cryptographic methods to limit authorized users accessing updated cloud data with expired keys. This paper also obtains the restrictions of choosing appropriate encryption algorithm to establish secure re-encryption scheme in cloud data services.
Keywords :
cloud computing; cryptography; data privacy; outsourcing; Internet; cloud computing; cloud servers; data privacy; data security; double cryptographic methods; outsourced cloud data services; re-encryption security model; sensitive data confidentiality; sensitive data outsourcing; untrusted cloud service provider; cloud computing; data privacy; outsourced cloud data security; re-encryption;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Information and Network Security (ICINS 2013), 2013 International Conference on
Conference_Location :
Beijing
Electronic_ISBN :
978-1-84919-729-8
Type :
conf
DOI :
10.1049/cp.2013.2473
Filename :
6826022
Link To Document :
بازگشت