INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.2, No.1, Feb. 2012

Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud

Full Text (PDF, 276KB), PP.53-59


Views:75   Downloads:3

Author(s)

Xi Chen,Yong Li

Index Terms

Public key encryption with keyword search;proxy re-encryption;untrusted cloud;private searching

Abstract

As promising as cloud computing is, this paradigm brings forth new security and privacy challenges when operating in the untrusted cloud scenarios. In this paper, we propose a new cryptographic primitive Proxy Re-encryption with Private Searching (PRPS for short). The PRPS scheme enables the data users and owners efficiently query and access files storaged in untrusted cloud, while keeping query privacy and data privacy from the cloud providers. The concrete construction is based on proxy re-encryption, public key encryption with keyword search and the dual receiver cryptosystem. The scheme is semantically secure under the BDH assumption.

Cite This Paper

Xi Chen,Yong Li,"Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud", IJWMT, vol.2, no.1, pp.53-59, 2012.

Reference

[1]M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009.

[2]Shucheng Yu, Cong Wang, Kui Ren and Wenjing Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” Proceedings of INFOCOM 2010. IEEE,2010.

[3]G. Ateniese, K. Fu, M. Green, S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Information and System Security (TISSEC). 9 (1) (2006) 1–30.

[4]D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, “Public Key Encryption with Keyword Search,” Proceedings of Eurocrypt 2004, LNCS 3027, Springer-Verlag. 2004. pp. 506-522.

[5]T. Diament, H. K. Lee, A. D. Keromytis and M. Yung, “The Dual Receiver Cryptosystem and its Application,” Proceedings of the ACM CCS 2004, pp. 330-343.

[6]Qin Liu, Guojun Wang, Jie Wu, “An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing,” CSE‟09,vol.2, 2009 , pp. 715 - 720.

[7]J. Shao, Z. Cao, X. Liang, H. Lin, “Proxy re-encryption with keyword search,” Inf. Sci. 180 (2010) 2576–2587.