Skip to main content

Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing

  • Conference paper
  • First Online:
  • 1122 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 24))

Abstract

Outsourcing heavy storage and computation to the cloud servers now becomes more and more popular. How to secure share the cloud storage is an important problem for many mobile users. Proxy re-encryption is such a cryptographic primitive which can be used to secure share cloud data. Until now there are many kinds of proxy re-encryption schemes with various properties, such as conditional proxy re-encryption, proxy re-encryption with keyword search etc. However until now there exists no work focus on proxy re-encryption for mobile cloud storage sharing. In mobile cloud storage, almost all the users are mobile ones, they only have resource-restricted equipments. In this paper we try to initialize this research, we give a very basic outsourced online/offline proxy re-encryption scheme for mobile cloud storage sharing and leave many interesting open problems as the future work.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT’98. Volume 1403 of LNCS, pp. 127–144, Espoo, Finland, May 31–June 4, 1998. Springer, Berlin

    Google Scholar 

  2. A., Dodis, Y.: Proxy cryptography revisited. In: NDSS 2003, San Diego, California, USA, February 5–7, 2003. The Internet Society

    Google Scholar 

  3. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS 2005, San Diego, California, USA, February 3–4, 2005. The Internet Society

    Google Scholar 

  4. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)

    Article  Google Scholar 

  5. Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure multicast using proxy encryption. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 05. Volume 3783 of LNCS, pp. 280–290, Beijing, China, December 10–13, 2005. Springer, Berlin, Germany (2005)

    Chapter  Google Scholar 

  6. Chu, C., Tzeng, W.: Identity-based proxy re-encryption without random oracles. In: ISC 2007. Volume 4779 of LNCS, pp. 189–202 (2007)

    Google Scholar 

  7. Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: ACNS 2007. Volume 4521 of LNCS, pp. 288–306 (2007)

    Google Scholar 

  8. Shao, J., Liu, P., Wei, G., Ling, Y.: Anonymous proxy re-encryption. Secur. Commun. Netw. 5(5), 439–449 (2012)

    Article  Google Scholar 

  9. Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. Volume 8712 of LNCS, pp. 257–272, Wroclaw, Poland, September 7–11, 2014. Springer, Berlin, Germany

    Google Scholar 

  10. Wang, Y., Jiali, D., Cheng, X., Liu, Z., Lin, K.: Degradation and encryption for outsourced png images in cloud storage. Int. J. Grid Util. Comput. 7(1), 22–28 (2016)

    Article  Google Scholar 

  11. Zhu, S., Yang, X.: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91–97 (2015)

    Article  Google Scholar 

  12. Guo, S., Haixia, X.: A secure delegation scheme of large polynomial computation in multi-party cloud. Int. J. Grid Util. Comput. 6(2), 1–7 (2015)

    Google Scholar 

  13. Dutu, C., Apostol, E., Leordeanu, C., Cristea, V.: A solution for the management of multimedia sessions in hybrid clouds. Int. J. Space-Based Situated Comput. 4(2), 77–87 (2014)

    Article  Google Scholar 

  14. Thabet, M., Boufaida, M., Kordon, F.: An approach for developing an interoperability mechanism between cloud providers. Int. J. Space-Based Situated Comput. 4(2), 88–99 (2014)

    Article  Google Scholar 

  15. Wang, L., Wang, L., Mambo,M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 10. Volume 6476 of LNCS, pp. 383–400, Barcelona, Spain, December 15–17, 2010. Springer, Berlin, Germany

    Chapter  Google Scholar 

  16. Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Cryptology ePrint Archive, Report 2010/265, 2010. Available at http://eprint.iacr.org

  17. Weng, J., Yang, Y., Tang, Q., Deng, R., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: ISC 2009. Volume 5735 of LNCS, pp. 151–166 (2008)

    Google Scholar 

  18. Shao, J., Cao, Z., Liang, X., Lin, H.: Proxy re-encryption with keyword search. In: Information Science 2010 (2010), https://doi.org/10.1016/j.ins.2010.03.026

    Article  MathSciNet  Google Scholar 

  19. Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairing. In: PKC 2009. LNCS 5443, pp. 357–376. Springer, Berlin (2009)

    Chapter  Google Scholar 

  20. Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. AISACCS 2009, 276–286 (2009)

    Google Scholar 

  21. Wang, X., Xhafa, F., Ma, J., Barolli, L., Ge, Y.: PRE+: dual of proxy re-encryption for secure cloud data sharing service. Int. J. Web Grid Serv. 14(1), 44–69 (2018)

    Article  Google Scholar 

  22. Wang, X., Huang, X., Yang, X., Liu, L., Wu, X.: Further observation on proxy re-encryption with keyword search. J. Syst. Softw. 85(3), 643–654 (2012)

    Article  Google Scholar 

  23. Tang, Q.: Type-based proxy re-encryption and its construction. In: INDOCRYPT 2008. Volume 5365 of LNCS, pp. 130–144 (2008)

    Chapter  Google Scholar 

Download references

Acknowledgements

This work is supported by National Cryptography Development Fund of China Under Grants No. MMJJ20170112, National Natural Science Foundation of China (Grant Nos. 61772550, 61572521, U1636114, 61402531), National Key Research and Development Program of China Under Grants No. 2017YFB0802000, Natural Science Basic Research Plan in Shaanxi Province of china (Grant Nos. 2018JM6028, 2016JQ6037) and Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201610).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xu An Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, X.A., Nedjah, N., Sangaiah, A.K., Shan, C., Wang, Z. (2019). Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing. In: Xhafa, F., Leu, FY., Ficco, M., Yang, CT. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 24. Springer, Cham. https://doi.org/10.1007/978-3-030-02607-3_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02607-3_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02606-6

  • Online ISBN: 978-3-030-02607-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics