DocumentCode
686406
Title
Re-encryption security model over outsourced cloud data
Author
Lizhi Xiong ; Zhengquan Xu
Author_Institution
State Key Lab. of Inf. Eng. in Surveying, Mapping & Remote Sensing, Wuhan Univ., Wuhan, China
fYear
2013
fDate
22-24 Nov. 2013
Firstpage
1
Lastpage
5
Abstract
Cloud computing is recommended as a promising technology, which delivers computational facilities as services to users over the Internet. As well as, the cloud computing brings significant risks for greater exposure to data security when users outsource sensitive data for sharing on cloud servers. To keep sensitive data confidentiality against untrusted cloud service provider, this paper discusses this challenging open issue using re-encryption scheme in outsourced cloud data. On the one hand, it allows the data owner to delegate most of the computation tasks to untrusted cloud servers providers without the need to have knowledge of the underlying plain texts. On the other hand, it employs double cryptographic methods to limit authorized users accessing updated cloud data with expired keys. This paper also obtains the restrictions of choosing appropriate encryption algorithm to establish secure re-encryption scheme in cloud data services.
Keywords
cloud computing; cryptography; data privacy; outsourcing; Internet; cloud computing; cloud servers; data privacy; data security; double cryptographic methods; outsourced cloud data services; re-encryption security model; sensitive data confidentiality; sensitive data outsourcing; untrusted cloud service provider; cloud computing; data privacy; outsourced cloud data security; re-encryption;
fLanguage
English
Publisher
iet
Conference_Titel
Information and Network Security (ICINS 2013), 2013 International Conference on
Conference_Location
Beijing
Electronic_ISBN
978-1-84919-729-8
Type
conf
DOI
10.1049/cp.2013.2473
Filename
6826022
Link To Document