用于云数据共享的可靠公平的基于属性的代理再加密系统

Rishi N, S Anu Priya2
{"title":"用于云数据共享的可靠公平的基于属性的代理再加密系统","authors":"Rishi N, S Anu Priya2","doi":"10.48175/ijarsct-18402","DOIUrl":null,"url":null,"abstract":"The widespread acceptance and quick growth of cloud computing have made data sharing easier than ever before. What is preventing widespread adoption of cloud computing, however, is how to guarantee the security of the user's data in the cloud. Safe data sharing in cloud computing can be achieved through the use of proxy re-encryption. With the use of a semi trusted cloud server, a data owner can encrypt shared data in the cloud using their own public key, converting it into an encryption meant only for authorized recipients to control access. To help us grasp this fundamental better, this paper provides a thorough and motivating overview of re-encryption of proxy servers from a variety of angles. For granular access control of shared data, Ciphertext-Policy Attribute based Aes (CP-ABE) is a possible cryptographic primitive. Each user in CP-ABE has a set of attributes, and access structures based on attributes are used to encrypt data. If and only if a user's characteristics meet the requirements of the ciphertext access structure, the user can decrypt a ciphertext. Practical applications typically call for additional requirements in addition to this fundamental one. Our research centers on the significant problem of attribute revocation, which poses a challenge for CP-ABE methods","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"6 6","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Reliable and Equitable Attribute-Based Proxy Re-encryption System for Cloud Data Sharing\",\"authors\":\"Rishi N, S Anu Priya2\",\"doi\":\"10.48175/ijarsct-18402\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The widespread acceptance and quick growth of cloud computing have made data sharing easier than ever before. What is preventing widespread adoption of cloud computing, however, is how to guarantee the security of the user's data in the cloud. Safe data sharing in cloud computing can be achieved through the use of proxy re-encryption. With the use of a semi trusted cloud server, a data owner can encrypt shared data in the cloud using their own public key, converting it into an encryption meant only for authorized recipients to control access. To help us grasp this fundamental better, this paper provides a thorough and motivating overview of re-encryption of proxy servers from a variety of angles. For granular access control of shared data, Ciphertext-Policy Attribute based Aes (CP-ABE) is a possible cryptographic primitive. Each user in CP-ABE has a set of attributes, and access structures based on attributes are used to encrypt data. If and only if a user's characteristics meet the requirements of the ciphertext access structure, the user can decrypt a ciphertext. Practical applications typically call for additional requirements in addition to this fundamental one. Our research centers on the significant problem of attribute revocation, which poses a challenge for CP-ABE methods\",\"PeriodicalId\":472960,\"journal\":{\"name\":\"International Journal of Advanced Research in Science, Communication and Technology\",\"volume\":\"6 6\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-05-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Advanced Research in Science, Communication and Technology\",\"FirstCategoryId\":\"0\",\"ListUrlMain\":\"https://doi.org/10.48175/ijarsct-18402\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Research in Science, Communication and Technology","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.48175/ijarsct-18402","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

云计算的广泛接受和快速发展使数据共享变得前所未有的容易。然而,阻碍云计算广泛应用的是如何保证云中用户数据的安全。云计算中的安全数据共享可以通过使用代理重加密来实现。通过使用半信任的云服务器,数据所有者可以使用自己的公开密钥对云中的共享数据进行加密,将其转换为只供授权接收者控制访问的加密方式。为了帮助我们更好地掌握这一基本原理,本文从多个角度对代理服务器的再加密进行了全面而有启发性的概述。对于共享数据的细粒度访问控制,基于密文策略属性的 Aes(CP-ABE)是一种可行的加密原语。CP-ABE 中的每个用户都有一组属性,基于属性的访问结构用于加密数据。只有当用户的特征符合密文访问结构的要求时,用户才能解密密文。在实际应用中,除了这一基本要求外,通常还需要其他要求。我们的研究重点是属性撤销这一重大问题,它对 CP-ABE 方法提出了挑战
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Reliable and Equitable Attribute-Based Proxy Re-encryption System for Cloud Data Sharing
The widespread acceptance and quick growth of cloud computing have made data sharing easier than ever before. What is preventing widespread adoption of cloud computing, however, is how to guarantee the security of the user's data in the cloud. Safe data sharing in cloud computing can be achieved through the use of proxy re-encryption. With the use of a semi trusted cloud server, a data owner can encrypt shared data in the cloud using their own public key, converting it into an encryption meant only for authorized recipients to control access. To help us grasp this fundamental better, this paper provides a thorough and motivating overview of re-encryption of proxy servers from a variety of angles. For granular access control of shared data, Ciphertext-Policy Attribute based Aes (CP-ABE) is a possible cryptographic primitive. Each user in CP-ABE has a set of attributes, and access structures based on attributes are used to encrypt data. If and only if a user's characteristics meet the requirements of the ciphertext access structure, the user can decrypt a ciphertext. Practical applications typically call for additional requirements in addition to this fundamental one. Our research centers on the significant problem of attribute revocation, which poses a challenge for CP-ABE methods
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信