Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
by B.R. Purushothama; B. Shrinath; B.B. Amberker
International Journal of Information and Communication Technology (IJICT), Vol. 5, No. 2, 2013

Abstract: Cloud computing is a new computing paradigm wherein the resources of the computing infrastructure are provided as services over the internet. The benefits offered by the public cloud encourage the data owners/organisations to store their data on to the cloud storage provided by the cloud storage provider. Cloud computing poses new security challenges as the users outsource their data to public cloud. Building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the data owner is a security challenge. The existing popular storage services does not provide cryptographic guarantee for the security. They are often guided by service level agreements and policies. In this paper, we propose and implement a secure storage service providing a cryptographic guarantee for the security to store, access and share the user's data. We propose the notion of limited proxy re-encryption scheme to restrict the proxy from re-encrypting more than specified number of delegator's ciphertexts. We give the security model and analyse the scheme for security. We use the proposed limited proxy re-encryption scheme as the primitive and design an improved and efficient sharing method for the secure storage service.

Online publication date: Thu, 19-Dec-2013

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Communication Technology (IJICT):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com