Reference Hub2
Secure Key Storage and Access Delegation Through Cloud Storage

Secure Key Storage and Access Delegation Through Cloud Storage

Bharati Mishra, Debasish Jena, Ramasubbareddy Somula, S. Sankar
Copyright: © 2020 |Volume: 11 |Issue: 4 |Pages: 20
ISSN: 1947-8208|EISSN: 1947-8216|EISBN13: 9781799807209|DOI: 10.4018/IJKSS.2020100104
Cite Article Cite Article

MLA

Mishra, Bharati, et al. "Secure Key Storage and Access Delegation Through Cloud Storage." IJKSS vol.11, no.4 2020: pp.45-64. http://doi.org/10.4018/IJKSS.2020100104

APA

Mishra, B., Jena, D., Somula, R., & Sankar, S. (2020). Secure Key Storage and Access Delegation Through Cloud Storage. International Journal of Knowledge and Systems Science (IJKSS), 11(4), 45-64. http://doi.org/10.4018/IJKSS.2020100104

Chicago

Mishra, Bharati, et al. "Secure Key Storage and Access Delegation Through Cloud Storage," International Journal of Knowledge and Systems Science (IJKSS) 11, no.4: 45-64. http://doi.org/10.4018/IJKSS.2020100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud storage is gaining popularity to store and share files. To secure the files, cloud storage providers supply client interfaces with the facility to encrypt the files and upload them into the cloud. When client-side encryption is done, the onus of key management lies with the cloud user. Public key proxy re-encryption mechanisms can be used to distribute the key among stakeholders of the file. However, clients use low powered devices like mobile phones to share their files. Lightweight cryptography operations are needed to carry out the encryption operations. Ring-LWE-based encryption scheme meets this criterion. In this work, a proxy re-encryption scheme is proposed to distribute the file key. The scheme is proved CCA secure under Ring-LWE assumption in the random oracle model. The performance of the scheme is compared with the existing proxy re-encryption schemes which are observed to show better performance for re-encryption and re-key generation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.