skip to main content
10.1145/2046707.2093514acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing

Authors Info & Claims
Published:17 October 2011Publication History

ABSTRACT

We propose CL-PRE, a certificateless proxy re-encryption scheme for data sharing with cloud. In CL-PRE, a data owner encrypts shared data in cloud with an encryption key, which is further encrypted and transformed by cloud, and then distributed to legitimate recipients for access control. Uniquely, the cloud-based transformation leverages re-encryption keys derived from private key of data owner and public keys of receipts, and eliminates the key escrow problem with identity based cryptography and the need of certificate. While preserving data and key privacy from semi-trusted cloud, CL-PRE maximumly leverages cloud resources to reduce the computing and communication cost for data owner. We implement CL-PRE and evaluate its security and performance.

References

  1. AWS Customer Agreement http://aws.amazon.com/agreement/, 2011.Google ScholarGoogle Scholar
  2. S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. In ASIACRYPT, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  3. G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM TISSEC, 9:1 -- 30, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In CRYPTO, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, 2009. https://cloudsecurityalliance.org/csaguide.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader