Table of Content

Open Access

ARTICLE

A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing

Yongli Tang1, Huanhuan Lian1, Zemao Zhao2, Xixi Yan1,*
College of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, 454000, China.
School of Engineering, Lishui University, Lishui, 323000, China.
* Corresponding Author: Xixi Yan. Email: .

Computers, Materials & Continua 2018, 56(2), 339-352. https://doi.org/ 10.3970/cmc.2018.02965

Abstract

With the widespread use of cloud computing technology, more and more users and enterprises decide to store their data in a cloud server by outsourcing. However, these huge amounts of data may contain personal privacy, business secrets and other sensitive information of the users and enterprises. Thus, at present, how to protect, retrieve, and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment. A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server. In this scheme, the user data are divided into files, file indexes and the keyword corresponding to the files, which are respectively encrypted to store. The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes, but re-encrypt the cipher-text of keywords corresponding to the files. Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack. And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption. Furthermore, the scheme does not need to use any secure channels, making it more effective in the cloud environment.

Keywords

Cloud computing, keyword search, proxy re-encryption, provable security.

Cite This Article

Y. . Tang, H. . Lian, Z. . Zhao and X. . Yan, "A proxy re-encryption with keyword search scheme in cloud computing," Computers, Materials & Continua, vol. 56, no.2, pp. 339–352, 2018.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1526

    View

  • 957

    Download

  • 0

    Like

Related articles

Share Link

WeChat scan