CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Title | CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Mishra, B., Jena, D. |
Conference Name | 2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT) |
ISBN Number | 978-1-5386-3719-7 |
Keywords | CCA secure proxy re-encryption scheme, chosen ciphertext secure, cloud computing, cloud storage security, cloud storage service, Collaborative Work, composability, computing technologies, confidentiality, CSS, decryption time, encrypted files, Encryption, groupware, Human Behavior, human factors, lattice based cryptography, Lattices, malicious insiders, Metrics, Peer-to-peer computing, Proxy Reencryption, pubcrawl, Public key, public key cryptography, quantum computing, quantum computing algorithms, random oracle model, random processes, resilience, Resiliency, ring-lwe, robust file storage capability, search problem, search problems, secure data sharing, Secure File Sharing, secure file sharing scheme, security issues |
Abstract | Cloud Storage Service(CSS) provides unbounded, robust file storage capability and facilitates for pay-per-use and collaborative work to end users. But due to security issues like lack of confidentiality, malicious insiders, it has not gained wide spread acceptance to store sensitive information. Researchers have proposed proxy re-encryption schemes for secure data sharing through cloud. Due to advancement of computing technologies and advent of quantum computing algorithms, security of existing schemes can be compromised within seconds. Hence there is a need for designing security schemes which can be quantum computing resistant. In this paper, a secure file sharing scheme through cloud storage using proxy re-encryption technique has been proposed. The proposed scheme is proven to be chosen ciphertext secure(CCA) under hardness of ring-LWE, Search problem using random oracle model. The proposed scheme outperforms the existing CCA secure schemes in-terms of re-encryption time and decryption time for encrypted files which results in an efficient file sharing scheme through cloud storage. |
URL | https://ieeexplore.ieee.org/document/8470404 |
DOI | 10.1109/EAIT.2018.8470404 |
Citation Key | mishra_cca_2018 |
- resilience
- Peer-to-peer computing
- Proxy Reencryption
- pubcrawl
- Public key
- public key cryptography
- quantum computing
- quantum computing algorithms
- random oracle model
- random processes
- Metrics
- Resiliency
- ring-lwe
- robust file storage capability
- search problem
- search problems
- secure data sharing
- Secure File Sharing
- secure file sharing scheme
- security issues
- decryption time
- chosen ciphertext secure
- Cloud Computing
- cloud storage security
- cloud storage service
- Collaborative Work
- composability
- computing technologies
- confidentiality
- CSS
- CCA secure proxy re-encryption scheme
- encrypted files
- encryption
- groupware
- Human behavior
- Human Factors
- lattice based cryptography
- Lattices
- malicious insiders