Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Asymmetric proxy re-encryption scheme of efficient access to outsourcing data for mobile users
HAO Wei, YANG Xiaoyuan, WANG Xu'an, ZHANG Yingnan, WU Liqiang
Journal of Computer Applications    2016, 36 (8): 2225-2230.   DOI: 10.11772/j.issn.1001-9081.2016.08.2225
Abstract383)      PDF (1032KB)(299)       Save
In order to make the mobile device more convenient and faster decrypt the outsourcing data stored in the cloud, on the basis of Identity-Based Broadcast Encryption (IBBE) system and Identity-Based Encryption (IBE) system, using the technique of outsourcing the decryption proposed by Green et al. (GREEN M, HOHENBERGER S, WATERS B. Outsourcing the decryption of ABE ciphertexts. Proceedings of the 20th USENIX Conference on Security. Berkeley:USENIX Association, 2011:34), a Modified Asymmetric Cross-cryptosystem Proxy Re-Encryption (MACPRE) scheme across the encryption system was proposed. The proposed scheme is more suitable for mobile devices with limited computing power to securely share the data stored in the cloud. When the mobile user decrypts the re-encrypted data, the plaintext can be restored by performing one exponent operation and one bilinear pairing operation, which greatly improves the decryption efficiency of the mobile user and saves the power consumption of the mobile user. The security of this proposed scheme can be reduced to the security of the IBE and IBBE scheme. The theoretical analysis and experimental results show that, the proposed scheme can allow the mobile devices to decrypt data stored in the cloud by spending less time, and ease the problem of limited computing power of the mobile devices. The proposed scheme is more practical.
Reference | Related Articles | Metrics
Cloud service behavior trust model based on non-interference theory
XIE Hong'an, LIU Dafu, SU Yang, ZHANG Yingnan
Journal of Computer Applications    2016, 36 (10): 2728-2732.   DOI: 10.11772/j.issn.1001-9081.2016.10.2728
Abstract457)      PDF (729KB)(375)       Save
In order to solve the security threat of resource sharing and privilege existed in cloud service environment, a new cloud trust model based on non-interference theory, namely NICTM, was proposed. The elements existed in cloud service such as domains, actions, situations, and outputs were abstracted to formally define the trusted domain in cloud services. Besides, the theorem of trusted user domain behavior was proved, and the user domain which followed the theorem could be proved to be trusted. Finally the prototype system was built on Xen virtualization platform, and the feasibility of the model was verified by experiments.
Reference | Related Articles | Metrics