A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure

Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit a...

Full description

Saved in:
Bibliographic Details
Main Authors: Sun-Ho Lee, Im-Yeong Lee
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/615679
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849684171266457600
author Sun-Ho Lee
Im-Yeong Lee
author_facet Sun-Ho Lee
Im-Yeong Lee
author_sort Sun-Ho Lee
collection DOAJ
description Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.
format Article
id doaj-art-bd96f779b37343dd8053966bc5814fc9
institution DOAJ
issn 2356-6140
1537-744X
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-bd96f779b37343dd8053966bc5814fc92025-08-20T03:23:34ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/615679615679A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage StructureSun-Ho Lee0Im-Yeong Lee1Department of Computer Software Engineering, Soonchunhyang University, Asan-si, Chungcheongnam-do, Republic of KoreaDepartment of Computer Software Engineering, Soonchunhyang University, Asan-si, Chungcheongnam-do, Republic of KoreaData outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.http://dx.doi.org/10.1155/2014/615679
spellingShingle Sun-Ho Lee
Im-Yeong Lee
A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
The Scientific World Journal
title A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
title_full A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
title_fullStr A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
title_full_unstemmed A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
title_short A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure
title_sort study of practical proxy reencryption with a keyword search scheme considering cloud storage structure
url http://dx.doi.org/10.1155/2014/615679
work_keys_str_mv AT sunholee astudyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure
AT imyeonglee astudyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure
AT sunholee studyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure
AT imyeonglee studyofpracticalproxyreencryptionwithakeywordsearchschemeconsideringcloudstoragestructure