Cargando…

A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure

Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit a...

Descripción completa

Detalles Bibliográficos
Autores principales: Lee, Sun-Ho, Lee, Im-Yeong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3944203/
https://www.ncbi.nlm.nih.gov/pubmed/24693240
http://dx.doi.org/10.1155/2014/615679
_version_ 1782306341607440384
author Lee, Sun-Ho
Lee, Im-Yeong
author_facet Lee, Sun-Ho
Lee, Im-Yeong
author_sort Lee, Sun-Ho
collection PubMed
description Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.
format Online
Article
Text
id pubmed-3944203
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-39442032014-04-01 A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure Lee, Sun-Ho Lee, Im-Yeong ScientificWorldJournal Research Article Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search. Hindawi Publishing Corporation 2014-02-12 /pmc/articles/PMC3944203/ /pubmed/24693240 http://dx.doi.org/10.1155/2014/615679 Text en Copyright © 2014 S.-H. Lee and I.-Y. Lee. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Lee, Sun-Ho
Lee, Im-Yeong
A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
title A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
title_full A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
title_fullStr A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
title_full_unstemmed A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
title_short A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
title_sort study of practical proxy reencryption with a keyword search scheme considering cloud storage structure
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3944203/
https://www.ncbi.nlm.nih.gov/pubmed/24693240
http://dx.doi.org/10.1155/2014/615679
work_keys_str_mv AT leesunho astudyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure
AT leeimyeong astudyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure
AT leesunho studyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure
AT leeimyeong studyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure