2014
DOI: 10.1007/978-3-319-11116-2_11
|View full text |Cite
|
Sign up to set email alerts
|

A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage

Abstract: Abstract.Users are motivated to outsource their data into the cloud for its great flexibility and economic saving. However, outsourcingdata to cloud also increases the risk of privacy leak.A straightforward method to protect the users'privacy is to encrypt the files before outsourcing.The existing group key management methods always presume that the server is trustworthy, but cloud storage applications do not meet this condition. Therefore, how to manage the group key to enable authenticated usersto access the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…However, the data owner has to transform the plaintext into ciphertext, and vice versa that involves execution of computationally intensive multiplication and exponential operations of large numbers on resouce constraion mobile device. [27][28][29][30][31] propose proxy re-encryption algorithm to confirm the security of the data in the cloud, which can alleviate the client's burden, and enhance the confidentiality of cloud data. However, there are two major disadvantages with these techniques.…”
Section: Related Workmentioning
confidence: 99%
“…However, the data owner has to transform the plaintext into ciphertext, and vice versa that involves execution of computationally intensive multiplication and exponential operations of large numbers on resouce constraion mobile device. [27][28][29][30][31] propose proxy re-encryption algorithm to confirm the security of the data in the cloud, which can alleviate the client's burden, and enhance the confidentiality of cloud data. However, there are two major disadvantages with these techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Among different constructions of proxy re‐encryption, ElGamal‐based construction provides the features of collusion resistance, bidirectional, noninteractive, proxy‐invisibility, nontransitive, nontransferable, 8 9 . Following this, Cui et al 10 introduced a time‐based GKM scheme relying on proxy re‐encryption tailored for cloud storage systems. They claimed that in contrast to schemes based on Tree‐based Group Diffie–Hellman and public–private key pairs, the group key distribution and recovery costs in their scheme remain constant despite the increase in the number of users.…”
Section: Introductionmentioning
confidence: 99%