计算机科学
共谋
云计算
许可
加密
计算机安全
代理(统计)
身份(音乐)
领域(数学分析)
方案(数学)
代理重新加密
云存储
访问控制
计算机网络
公钥密码术
操作系统
数学分析
法学
微观经济学
经济
政治学
物理
机器学习
数学
声学
作者
Jinguang Han,Willy Susilo,Yi Mu
标识
DOI:10.1016/j.future.2012.07.010
摘要
Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from the same domain (intra-domain) are considered. We note that one of the main applications of identity-based proxy re-encryption schemes is in the cloud computing scenario. Nevertheless, in this scenario, users in different domains can share files with each other. Therefore, the existing solutions do not actually solve the motivating scenario, when the scheme is applicable for cloud computing. Hence, it remains an interesting and challenging research problem to design an identity-based data storage scheme which is secure against collusion attacks and supports intra-domain and inter-domain queries. In this paper, we propose an identity-based data storage scheme where both queries from the intra-domain and inter-domain are considered and collusion attacks can be resisted. Furthermore, the access permission can be determined by the owner independently.
科研通智能强力驱动
Strongly Powered by AbleSci AI