Offline privacy preserving proxy re-encryption in mobile cloud computing

Pervasive and Mobile Computing 59 (2019)
  Copy   BIBTEX

Abstract

This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued to legitimate users. An in depth analysis shows that our scheme is secure, flexible and efficient for mobile cloud computing.

Links

PhilArchive

External links

  • This entry has no external links. Add one.
Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Lockbox: mobility, privacy and values in cloud storage. [REVIEW]Luke Stark & Matt Tierney - 2014 - Ethics and Information Technology 16 (1):1-13.
Cloud Computing and its ethical issues.J. Jeniffer - 2012 - Eubios Journal of Asian and International Bioethics 22 (4):155-157.
Privacy and the encryption debate.Adam Moore - 2000 - Knowledge, Technology & Policy 12 (4):72-84.
The Ethics of Cloud Computing.Boudewijn de Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
Privacy on the Line: The Politics of Wiretapping and Encryption.S. Martin - 1999 - Knowledge, Technology & Policy 12 (2):79-80.

Analytics

Added to PP
2020-07-12

Downloads
472 (#38,917)

6 months
94 (#43,850)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references