By Topic

Access Control Enforcement Based on Proxy Re-encryption in Data Outsourcing Environment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Jiazhu Dai ; Sch. of Comput. Eng. & Sci., Shanghai Univ., Shanghai, China ; Shuangyan Luo ; Yurong Zhang ; Chuan Zhang

Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external data storage provider that then become responsible for their storage, management, and dissemination. Although data outsourcing provides many benefits, it introduces new privacy and security concerns. How to protect the outsourcing data privacy when the access control policies are changed dynamically is an important problem. Existing solutions to the problem adopt over-encryption to protect data privacy, it is low efficiency, because every time the users request data from the data storage provider, the data storage provider must encrypt the data with a new key and the users decrypt the data twice. In this paper we present a novel solution to this issue, which based on proxy re-encryption. In the proposed solution, when the users request data from the DSP, the DSP send the cipher text to the users directly without encrypting the data with another second-level key, and the users decrypt the cipher text to get the data with only a new key. Therefore, high efficiency is achieved. We analyze the performance and security of our approach.

Published in:

2011 Third International Conference on Multimedia Information Networking and Security

Date of Conference:

4-6 Nov. 2011