About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing

In Proceedings of 18<sup>th</sup> Ieee International Conference on Dependable, Autonomic and Secure Computing — 2020, pp. 569-576
From

Central China Normal University1

Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Cyber Security, Department of Applied Mathematics and Computer Science, Technical University of Denmark3

Security of cloud storage and sharing is concerned for years since a semi-trusted party, Cloud Server Provider (CSP), has access to user data on cloud server that may leak users' private data without constraint. Intuitively, an efficient solution of protecting cloud data is to encrypt it before uploading to the cloud server.

However, a new requirement, data sharing, makes it difficult to manage secret keys among data owners and target users. Therefore conditional proxy broadcast re-encryption technology (CPBRE) is proposed in recent years to provide data encryption and sharing approaches for cloud environment. It enables a data owner to upload encrypted data to the cloud server and a third party proxy can re-encrypted cloud data under certain condition to a new ciphertext so that target users can decrypt re-encrypted data using their own private key.

But few CPBRE schemes are applicable for a dynamic cloud environment. In this paper, we propose a new dynamic conditional proxy broadcast reencryption scheme that can be dynamic in system user setting and target user group. The initialization phase does not require a fixed system user setup so that users can join or leave the system in any time.

And data owner can dynamically change the group of user he wants to share data with. We also provide security analysis which proves our scheme to be secure against CSP, and performance analysis shows that our scheme exceeds other schemes in terms of functionality and resource cost.

Language: English
Publisher: IEEE
Year: 2020
Pages: 569-576
Proceedings: 18<sup>th</sup> IEEE Int’l Conference on Dependable, Autonomic and Secure Computing
ISBN: 1728166098 , 1728166101 , 9781728166094 and 9781728166100
Types: Conference paper
DOI: 10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00101
ORCIDs: Meng, Weizhi

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis