CFP last date
22 April 2024
Reseach Article

Proxy Re-encryption Schemes for Secure Cloud Data and Applications: A Survey

by Raghi Roy, Paul P. Mathai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 5
Year of Publication: 2017
Authors: Raghi Roy, Paul P. Mathai
10.5120/ijca2017913642

Raghi Roy, Paul P. Mathai . Proxy Re-encryption Schemes for Secure Cloud Data and Applications: A Survey. International Journal of Computer Applications. 164, 5 ( Apr 2017), 1-6. DOI=10.5120/ijca2017913642

@article{ 10.5120/ijca2017913642,
author = { Raghi Roy, Paul P. Mathai },
title = { Proxy Re-encryption Schemes for Secure Cloud Data and Applications: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 5 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number5/27476-2017913642/ },
doi = { 10.5120/ijca2017913642 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:24.866876+05:30
%A Raghi Roy
%A Paul P. Mathai
%T Proxy Re-encryption Schemes for Secure Cloud Data and Applications: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 5
%P 1-6
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a survey on Proxy re-encryption techniques with respect to secure cloud data and its application. To keep sensitive user data confidential against untrusted servers, cryptographic methods are used to provide security and access control in clouds. As the data is shared over the network, it is needed to be encrypted. There are many encryption schemes that provide security and access control over the network.Proxy re-encryption enables the semi-trusted proxy server to re-encrypt the ciphertext encrypted under Alice’s public key to another ciphertext encrypted under Bob’s public key. The re-encryption is done without the server being able to decrypt the ciphertext.Cloud services and applications should follow the standard security measures including data confidentiality, integrity,privacy, robustness and access control.In this paper the proxy re-encryption(PRE) schemes, Conditional PRE,Identity based PRE and Broadcast PRE,Type based PRE, Key private PRE,Attribute based PRE,Threshold PRE and its role in securing the cloud data are explained.

References
  1. Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage, In Proceedings of the 12th Annual Network and Distributed System Security Symposium , pages 29-44. Internet Society, February 2005.
  2. A. G. Dimakis, P. G. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, Network coding for distributed storage systems, IEEE, 2010,pp. 4539-4551.
  3. P. Druschel and A. Rowstron,PAST: A Large- Scale, Persistent Peer-to-Peer Storage Utility, Proc.Eighth Workshop Hot Topics in Operating System, 2001, pp. 75-80.
  4. C.Wang, QianWang, KuiRen, and Wenjing Lou, Ensuring Data Storage Security in Cloud Computing, Proc. IWQoS 09, July 2009, pp. 1-9.
  5. M. Mambo and E. Okamoto,Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts, IEICE Trans. Fundamentals of Electronics, Comm. and Computer Sciences, 1997, pp. 54-63.
  6. Q. Tang, Type-Based Proxy Re-Encryption and Its Construction, Proc. Ninth International Conf. Cryptology in India, 2008, pp. 130-144.
  7. S. Saduqulla and S. Karimulla, Threshold Proxy Re-Encryption in Cloud Storage System, International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 11, November 2013.
  8. M. Blaze, G. Bleumer, and M. Strauss, Divertible Protocols and Atomic Proxy Cryptography in Proc. Int. Conf. Theory Appl. Crytographic Techn.: Adv. Cryptol, (1998)127-144.
  9. M. Green and G. Ateniese, Identity-based proxy re-encryption, in Proc. 5th Int. Conf. Appl. Cryptography Netw. Security, 2007, pp. 288-306.
  10. C.-K. Chu, J. Weng, S. S. M. Chow, J. Zhou, and R. H. Deng, Conditional proxy broadcast re-encryption,in Proc. 14th Australasian Conf. Inf. Security Privacy, 2009, pp. 327-342.
  11. G. Ateniese, K. Benson and S. Hohenberger, Key-Private Proxy Re-Encryption, Topics in Cryptology, Springer, 2009.
  12. Jian Weng, Robert H. Deng, Xuhua Ding, Cheng- Kang Chu, and Junzuo Lai,Conditional proxy reencryption secure against chosen-ciphertext attack,In ASIACCS ,2009,pp. 322-332.
  13. Rutuja Warhade,Prof. Basha Vankudothu, A Survey on Proxy Re-encryption Schemes for Data Security in Cloud International Journal of Advance Research in Computer Science and Management Studies,12,(2014)
  14. A. Boldyreva, M. Fischlin, A. Palacio, and B. Warinschi,A closer look at PKI: Security and efficiency, in Proc. 10th Int. Conf. Practice Theory Public-Key Cryptography, (2007)458- 475.
  15. Jian Weng, Robert H. Deng, Xuhua Ding, Cheng- Kang Chu, and Junzuo Lai, Conditional proxy reencryption secure against chosen-ciphertext attack,In ASIACCS,2009,pp. 322-332.
  16. Goyal V, Pandey O, Sahai A, and Waters B ,Attribute Based Encryption for Fine-Grained Access Conrol of Encrypted Data,In: ACM conference on Computer and Communications Security, 2006.
  17. Markus Jakobsson, On quorum controlled asymmetric proxy re-encryption, In Proceedings of Public Key Cryptography, pages 112-121, 1999.
  18. Lidong Zhou, Michael A. Marsh, Fred B. Schneider, and Anna Redz, Distributed blinding for ElGamal reencryption, Cornell Computer Science Department, 2004.
  19. Yevgeniy Dodis and Anca Ivan,Proxy cryptography revisited, In Proceedings of the Tenth Network and Distributed System Security Symposium, February 2003.
  20. A. Sahai and B. Waters,Fuzzy identity-based encryption, in Proc. EUROCRYPT 05, vol. 3494 of Lecture Notes in Computer Science, Springer, Heidelberg, pp. 457-473, 2005.
  21. T. Matsuo Proxy re-encryption systems for identity-based encryption, In T. Takagi, T. Okamoto, E. Okamoto, and T. Okamoto, editors,pp. 457-473,
  22. Emura, K., Miyaji, A., Omote, A timed-release proxy re-encryption scheme IEICE Transactions,98-A(8), 16821695 (2011)
Index Terms

Computer Science
Information Sciences

Keywords

Proxy re-encryprion cloud storage data confidentiality