Paper Title : An Authentication and Revocation Approach to Proxy Re-encryption in a Distributed File System
ISSN : 2394-2231
Year of Publication : 2021
MLA Style: Matthias.D , Charles Davidba , Anireh V. I. E "An Authentication and Revocation Approach to Proxy Re-encryption in a Distributed File System " Volume 8 - Issue 1 January-February , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: Matthias.D , Charles Davidba , Anireh V. I. E "An Authentication and Revocation Approach to Proxy Re-encryption in a Distributed File System " Volume 8 - Issue 1 January-February , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
The cloud can serve as a distributed file system and storage facility where data can be shared conveniently. For security and confidentiality/privacy purpose the data is encrypted and the proxy acts as an emissary to re-encrypt the already encrypted data to a receiver without having to give out the data provider’s private key. Furthermore, this work adopted an authentication and revocation mechanism whereby only receivers with certain attributes can have access to the ciphertext and the data provider has absolute power over his data as he can either send a revocation command to the proxy to delete the policy and therefore stop re-encrypting data to that particular recipient or revoke access to a particular file or both. This work combines the advantages of unidirectional proxy re-encryption with attribute based authentication technique, thus achieving attributes authentication before re-encryption. Moreover, this work finally proves that the system is secure and would significantly enhance the system security level
1. A. G. Dimakis, P. G. Godfrey, Y. Wu, M. J. Wainwright and K. Ramchandran,, “Network Coding for Distributed Storage Systems”, IEEE, pp. 4539-4551, 2010. 2. C. Wang, W. Qian, R. Kui and L. Wenjing, “Ensuring Data Storage Security in Cloud Computing”, pp.1- 9, 2009. 3. P. Druschel and A. Rowstron, A Large Scale, Persistent Peer-to-Peer Storage Utility, Proc. Eighth Workshop Hot Topics in Operating System, pp. 75-80, 2001. 4. Q. Tang, Type-Based Proxy Re-Encryption and Its Construction, Proc. Ninth International Conf. Cryptology in India, pp. 130-144, 2008. 5. G. B. M. Blaze and M. Strauss, Divertible Protocols and Atomic Proxy Cryptography in Proc. Advance Cryptology, pp. 127–144, 1998. 6. S. Sundareswaran, A. C. Squicciarini and D. Lin, Ensuring Distributed Accountability for Data Sharing in the Cloud, IEEE Transactions on Dependable and Secure Computing, vol. 9(4), 2012, pp. 556–568. 7. M. Mambo and E. Okamoto, Proxy cryptosystems: Delegation of the Power to Decrypt Ciphertexts, IEICE Transactions on Fundamentals Electronics Communication Computer Science, vol. 80(1), 1997, pp. 54–6,. 8. C. K. Chu, J. Weng, S. S. M. Chow, J. Zhou, and R. H. Deng, Conditional proxy broadcast re-encryption in Proc. 14th Australasian Conf. Inf. Security Privacy, pp. 327-342, 2009. 9. G. Ateniese, F. Kevin, G. Matthew and H. Susan, Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage; In Proceedings of the 12th Annual Network and Distributed System Security Symposium, pp. 29-44, 2005. 10. R. Canetti, S. Halevi, and J. Katz, Chosen-Ciphertext Security from Identity-Based Encryption, in: EUROCRYPT 2004, LNCS, vol. 3027, pp. 207–222, 2004. 11. R. Canetti, and S. Hohenberger, Chosen-Ciphertext Secure Proxy Re-Encryption, in: ACM CCS, 2007. 12. T. Matsuda, R. Nishimaki, and K. Tanaka, (2010). CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model, in: PKC 2010, LNCS, vol. 6056, pp. 261–278. 13. M. Green and G. Ateniese, Identity-based Proxy Re-encryption: Application Cryptography Network Security Lecture Notes Computer Science, vol. 4521, 2007, pp. 288– 306. 14. J. Weng, R. H. Deng, S. Liu, K.. Chen, J. Lai and X. Wang, Chosen-Ciphertext Secure Proxy ReEncryption Schemes without Pairings, in: CANS 2008, LNCS, vol. 5339, pp.1–17. 15. G. Ateniese, K.. Fu, M. Green, and S. Hohenberger, Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, ACM Transactions on Information and System Security (TISSEC) vol. 9 (1), 2006, pp. 1–30. 16. B. Libert and D. Vergnaud, Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption. International Conference on Cryptology in Africa, Vol. 4939, 2008, pp.360–379. 17. J. Shao and Z. Cao, CCA-Secure Proxy Re-Encryption without Pairings. In Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC’09, 2009, pp. 357– 376. 18. S. M. C. Sherman, W. Jian, Y. Yanjiang and H. D. Robert, Efficient Unidirectional Proxy Re-encryption, International Conference on Cryptology, vol. 6055, 2010, pp.316-332. 19. P. L. J. Shao and Y. Zhou, “Achieving Key Privacy without Losing CCA Security in Proxy Reencryption: J. System Software, vol. 85(3), 2011, pp.655–665. 20. J. Weng, M. Chen, Y. Yanjiang, D. Robert, K. Chen, and B. Feng, CCA-Secure Unidirectional Proxy Reencryption in the Adaptive Corruption Model without Random Oracles. Science China Information Science, vol. 53, 2010, pp. 593-606. 21. C. Chu and W. Tzeng, Identity-based Proxy Re-encryption without Random Oracles. Information Security Lecture Notes Computer Science vol. 4779, 2007, pp.189–202. 22. H. Wang, Z. Cao, W. Licheng, Multi-use Unidirectional Identity-based Proxy Re-encryption Schemes. Inf. Sci. vol. 180(20), 2010, pp.4042-4059. 23. G. W. J. Shao, P. Liu, and Y. Ling, Anonymous Proxy Re-encryption: Security Communication Network, Vol. 5(5), 2012, pp.439–449. 24. J. Weng, H. D Robert, S. Liu and K.. Chen, Chosen ciphertext secure bidirectional proxy re-encryption schemes without pairings. Information Sciences, vol. 180(24), 2010, pp. 5077–5089. 25. B. Libert and D. Vergnaud,. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption. Information Theory, IEEE Transactions on, vol. 57(3), 2011, pp. 1786–1802. 26. L. Guo, J. Sun, C. Zhang, and Y. Fang, A privacy-preserving Attribute-based Authentication System for Mobile Health Networks: IEEE Transaction on Mobile Computer, vol. 13(9), 2014, pp. 1927–1941. 27. K.. Wang, J. Yu, X. Liu and S. Guo, A Pre-authentication Approach to Proxy Re-encryption in Big Data, IEEE, 2017.
— Authentication, big data, privacy-preserving, proxy re-encryption, revocation, cloud.