A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit a...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2014-01-01
|
| Series: | The Scientific World Journal |
| Online Access: | http://dx.doi.org/10.1155/2014/615679 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849684171266457600 |
|---|---|
| author | Sun-Ho Lee Im-Yeong Lee |
| author_facet | Sun-Ho Lee Im-Yeong Lee |
| author_sort | Sun-Ho Lee |
| collection | DOAJ |
| description | Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search. |
| format | Article |
| id | doaj-art-bd96f779b37343dd8053966bc5814fc9 |
| institution | DOAJ |
| issn | 2356-6140 1537-744X |
| language | English |
| publishDate | 2014-01-01 |
| publisher | Wiley |
| record_format | Article |
| series | The Scientific World Journal |
| spelling | doaj-art-bd96f779b37343dd8053966bc5814fc92025-08-20T03:23:34ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/615679615679A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage StructureSun-Ho Lee0Im-Yeong Lee1Department of Computer Software Engineering, Soonchunhyang University, Asan-si, Chungcheongnam-do, Republic of KoreaDepartment of Computer Software Engineering, Soonchunhyang University, Asan-si, Chungcheongnam-do, Republic of KoreaData outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.http://dx.doi.org/10.1155/2014/615679 |
| spellingShingle | Sun-Ho Lee Im-Yeong Lee A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure The Scientific World Journal |
| title | A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure |
| title_full | A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure |
| title_fullStr | A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure |
| title_full_unstemmed | A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure |
| title_short | A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure |
| title_sort | study of practical proxy reencryption with a keyword search scheme considering cloud storage structure |
| url | http://dx.doi.org/10.1155/2014/615679 |
| work_keys_str_mv | AT sunholee astudyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure AT imyeonglee astudyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure AT sunholee studyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure AT imyeonglee studyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure |