Title: Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud

Authors: B.R. Purushothama; B. Shrinath; B.B. Amberker

Addresses: Department of Computer Science and Engineering, National Institute of Technology Warangal, Warangal, Andhra Pradesh-506004, India ' Department of Computer Science and Engineering, National Institute of Technology Warangal, Warangal, Andhra Pradesh-506004, India ' Department of Computer Science and Engineering, National Institute of Technology Warangal, Warangal, Andhra Pradesh-506004, India

Abstract: Cloud computing is a new computing paradigm wherein the resources of the computing infrastructure are provided as services over the internet. The benefits offered by the public cloud encourage the data owners/organisations to store their data on to the cloud storage provided by the cloud storage provider. Cloud computing poses new security challenges as the users outsource their data to public cloud. Building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the data owner is a security challenge. The existing popular storage services does not provide cryptographic guarantee for the security. They are often guided by service level agreements and policies. In this paper, we propose and implement a secure storage service providing a cryptographic guarantee for the security to store, access and share the user's data. We propose the notion of limited proxy re-encryption scheme to restrict the proxy from re-encrypting more than specified number of delegator's ciphertexts. We give the security model and analyse the scheme for security. We use the proposed limited proxy re-encryption scheme as the primitive and design an improved and efficient sharing method for the secure storage service.

Keywords: secure storage; cloud storage; limited proxy re-encryption; outsourcing; access control; public cloud; cloud security; storage security; data security; cryptographic guarantee; cryptography.

DOI: 10.1504/IJICT.2013.053116

International Journal of Information and Communication Technology, 2013 Vol.5 No.2, pp.167 - 186

Received: 01 May 2012
Accepted: 21 Nov 2012

Published online: 05 Apr 2013 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article