|Table of Contents|

Research and implementation of cloud data sharing mechanism based on proxy re-encryption

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2015年01期
Page:
84-88
Research Field:
Publishing date:

Info

Title:
Research and implementation of cloud data sharing mechanism based on proxy re-encryption
Author(s):
Pang YanmeiLi XiaodongYe Sishui
School of Computer,Beijing Electronic Science and Technology Institute,Beijing 100070
Keywords:
proxy re-encryption cloud storage data authorization data sharing bilinear paring decisional bilinear Diffie-Hellman Hadoop
PACS:
TH16
DOI:
-
Abstract:
To improve the flexibility and security of cloud data sharing,a proxy re-encryption based scheme is researched.A cloud data authorization and sharing solution is designed on proxy of data authorization through proxy re-encryption.The proxy re-encryption algorithm uses bilinear paring.The security is based on Decisional Bilinear Diffie-Hellman(DBDH)hypothesis.A cloud data sharing prototype system is implemented on a Hadoop cloud platform.The test and analysis show the data sharing is effective and secure.The work is valuable in application of proxy re-encryption in cloud data sharing.

References:

[1] Blaze M,Bleumer G,Strauss M,et al.Divertible proto-cols and atomic proxy cryptography[A].EUROCRYPTc 98[C].Heidelberg:Springer,1998:127-144.
[2]Ateniese G,Fu K,Green M,et al.Improved proxy re-encryption schemes with applications to secure distributed storage[J].ACM Transactions on Informa-tion and System Security,2006,9(1):1-30.
[3]Ibraimi L,Tang Q,Hartel P,et al.A type-and-identity-based proxy re-encryption scheme and its application in healthcare[A].SDMc 08[C].Heidelberg:Springer,2008:185-198.
[4]Taban G,Cárdenas A A,Gligoret V D.Towards a secure and interoperable DRM architecture[A].Proceedings of the ACM Workshop on Digital Rights Management 2006[C].New York,USA:ACM,2006:69-78.
[5]王红兵.基于双线性配对的代理重加密的研究[D].上海:上海交通大学计算机科学与技术系,2013.
[6]李琳琳,姚超,王庆超,等.基于Web Service的软件资源共享方法研究[J].火力与指挥控制,2014,39(5):45-48.
Li Linlin,Yao Chao,Wang Qingchao,et al.Research on software resources sharing method based on Web Service[J].Fire Control & Command Control,2014,39(5):45-48.
[7]崔文斌,牟少敏,王云诚,等.Hadoop大数据平台的搭建与测试[J].山东农业大学学报(自然科学版),2013,44(4):550-555.
Cui Wenbin,Mu Shaomin,Wang Yuncheng,et al.The building and testing platform for hadoop distributed-architecture[J].Journal of Shandong Agricultural University(Natural Science),2013,44(4):550-555.
[8]李双江,郝克刚,葛玮.一种基于Axis2的SOAP安全传输模型的研究[J].计算机技术与发展,2008,18(11):142-145.
Li Shuangjiang,Hao Kegang,Ge Wei.Research on a SOAP security model based on Axis2[J].Computer Technology and Development,2008,18(11):142-145.
[9]熊光彩,慕徳俊,张新家,等.基于Axis2的web服务安全框架设计与实现[J].计算机工程与设计,2012,33(5):1729-1733.
Xiong Guangcai,Mu Dejun,Zhang Xinjia,et al.Design and implementation of web service security framework based on Axis2[J].Computer Engineering and Design,2012,33(5):1729-1733.

Memo

Memo:
-
Last Update: 2015-02-28