Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2414456.2414507acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud

Published: 02 May 2012 Publication History

Abstract

We propose CL-PRE, a certificateless proxy re-encryption scheme for secure data sharing with public cloud, which leverages maximal cloud resources to reduce the computing and communication cost for data owner. Towards running proxy in public cloud environment, we further propose multi-proxy CL-PRE and randomized CL-PRE, which enhance the security and robustness of CL-PRE. We implement all CL-PRE schemes and evaluate their security and performance.

Cited By

View all
  • (2024)Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data SharingElectronics10.3390/electronics1303053413:3(534)Online publication date: 29-Jan-2024
  • (2024)Cyber Attacks on Big Data SystemData Management and Security in Blockchain Systems10.2174/9789815305814124010009(151-177)Online publication date: 19-Dec-2024
  • (2024)FairCMS: Cloud Media Sharing With Fair Copyright ProtectionIEEE Transactions on Computational Social Systems10.1109/TCSS.2024.337445211:5(6192-6209)Online publication date: Oct-2024
  • Show More Cited By

Index Terms

  1. CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
      May 2012
      119 pages
      ISBN:9781450316484
      DOI:10.1145/2414456
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 May 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. access control
      2. certificateless public key cryptography
      3. cloud computing
      4. cloud storage
      5. proxy re-encryption

      Qualifiers

      • Research-article

      Conference

      ASIA CCS '12
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 418 of 2,322 submissions, 18%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)30
      • Downloads (Last 6 weeks)5
      Reflects downloads up to 27 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data SharingElectronics10.3390/electronics1303053413:3(534)Online publication date: 29-Jan-2024
      • (2024)Cyber Attacks on Big Data SystemData Management and Security in Blockchain Systems10.2174/9789815305814124010009(151-177)Online publication date: 19-Dec-2024
      • (2024)FairCMS: Cloud Media Sharing With Fair Copyright ProtectionIEEE Transactions on Computational Social Systems10.1109/TCSS.2024.337445211:5(6192-6209)Online publication date: Oct-2024
      • (2024)Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.334056711:8(14115-14126)Online publication date: 15-Apr-2024
      • (2024)Secure and Real-Time Traceable Data Sharing in Cloud-Assisted IoTIEEE Internet of Things Journal10.1109/JIOT.2023.331476411:4(6521-6536)Online publication date: 15-Feb-2024
      • (2024)Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique2024 4th International Conference on Pervasive Computing and Social Networking (ICPCSN)10.1109/ICPCSN62568.2024.00117(700-705)Online publication date: 3-May-2024
      • (2024)A Novel Proxy Re-Encryption Technique for Secure Data Sharing in Cloud Environment2024 International Conference on Advances in Data Engineering and Intelligent Computing Systems (ADICS)10.1109/ADICS58448.2024.10533626(1-5)Online publication date: 18-Apr-2024
      • (2024)Securing big healthcare data using attribute and honey-based encryption in cloud environmentThe Journal of Supercomputing10.1007/s11227-024-06535-681:1Online publication date: 15-Nov-2024
      • (2024)Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on BlockchainBlockchain Technology and Emerging Applications10.1007/978-3-031-60037-1_7(115-134)Online publication date: 3-May-2024
      • (2023) FairShare : Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT IEEE Transactions on Network and Service Management10.1109/TNSM.2023.323983220:3(2929-2941)Online publication date: Sep-2023
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media