首页> 外文期刊>Soft computing: A fusion of foundations, methodologies and applications >An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
【24h】

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment

机译:使用子树的基于Identity的加密技术,用于云计算环境下的模糊用户数据共享

获取原文
获取原文并翻译 | 示例
           

摘要

The advancement of the cloud storage technology opens up a wide range of possibilities for adaptable data sharing. When sharing data to an extensive number of users with fuzzy identities, the data proprietor must use an appropriate identity-based encryption technique that satisfies both efficiency and security prerequisites. Identity-based encryption is a promising possibility to ensure fuzzy user data sharing while meeting the security essentials; however, it may encounter efficiency trouble in multi-receiver settings. Recently, identity-based encryption has received much attention, and most of the research has aimed to apply the technique in real-world systems. A major concern about using identity-based encryption is the safety of the private keys, as disclosure of secret keys requires the reissuing of encryptions already doled out. The capability to minimize the risks associated with key disclosure is particularly important due to the increased use of mobile and unprotected devices. In this article, we shall propose a forward-secure identity-based encryption technique based on subtree for fuzzy user data sharing under cloud computing environment, and we shall demonstrate that the technique is semantically secure against a chosen subtree and chosen ciphertext attack (IND-CST-CCA). In addition, we will show the superiority of our new technique over the currently existing methods in terms of security and the length of public key. Then, we will also discuss the potential of our new technique to be deployed in pay TV systems and grid security.
机译:云存储技术的进步为适应性数据共享开辟了广泛的可能性。在将数据与具有模糊身份的广泛用户共享到大量用户时,数据所有者必须使用满足效率和安全先决条件的适当基于身份的加密技术。基于身份的加密是一个有希望的可能性,可以在满足安全要素时确保模糊用户数据共享;但是,它可能会在多接收器设置中遇到效率问题。最近,基于身份的加密受到了很大的关注,并且大多数研究旨在在现实世界系统中应用技术。关于使用基于身份的加密的主要担忧是私钥的安全性,因为秘密密钥的披露需要重新解析加密已经耗尽。由于使用移动和未受保护的设备的使用增加,能够最小化与关键披露相关的风险尤为重要。在本文中,我们将基于云计算环境下的模糊用户数据共享的子树提出基于前进的基于身份的加密技术,我们将证明该技术针对所选的子树和所选的密文攻击(IND- CST-CCA)。此外,我们将在安全性和公钥的长度方面展示目前现有方法的新技术的优势。然后,我们还将讨论我们在付费电视系统和网格安全中部署的新技术的潜力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号