Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment 


Vol. 37,  No. 4, pp. 288-299, Apr.  2012


PDF
  Abstract

To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu"s work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Song and J. Do, "Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 4, pp. 288-299, 2012. DOI: .

[ACM Style]

You-jin Song and Jeong-min Do. 2012. Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment. The Journal of Korean Institute of Communications and Information Sciences, 37, 4, (2012), 288-299. DOI: .

[KICS Style]

You-jin Song and Jeong-min Do, "Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 4, pp. 288-299, 4. 2012.