Browse > Article
http://dx.doi.org/10.5573/ieie.2016.53.3.029

Method of Changing Password for Secure Cloud Storage based on Proxy Re-encryption Scheme  

Park, Young-Hoon (Sookmyung Women's University)
Seo, Seung-Woo (Seoul National University)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.53, no.3, 2016 , pp. 29-36 More about this Journal
Abstract
In cloud storages, as security of stored files and privacy of users become regarded as important concerns, secure cloud storages have been proposed, where stored files are encrypted with file owner's password and even the cloud service provider can not open the file contents. However, if the file owner forgets one's password, one can no longer access the file. To solve this problem, we propose a scheme for changing password for the secure cloud based on proxy re-encryption, which make the file owner enable to change password even when one forgets it. With the proposed scheme, only the file owner can change the password and re-encrypt the files securely because other user and even the service provider can not see the file contents.
Keywords
보안 클라우드;프록시 재암호화;공개키 암호화;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Fei Chen, Tao Xiang, Yuanyuan Yang, and Chow S.S.M., "Secure cloud storage meets with secure network coding," in INFOCOM, 2014 Proceedings IEEE, vol., no., pp.673-681, April 27 2014-May 2 2014
2 Cong Wang, Chow, S.S.M., Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," in Computers, IEEE Transactions on , vol.62, no.2, pp.362-375, Feb. 2013   DOI
3 Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. "Provable data possession at untrusted stores," in Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 598-609.
4 https://spideroak.com/
5 https://www.boxcryptor.com/
6 D. Boneh, and M. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., 32(3):586-615, Mar 2003.   DOI
7 X. Lin, X. Sun, P. Ho, and X. Shen. "GSIS: A secure and privacy-preserving protocol for vehicular communications," Vehicular Technology, IEEE Transactions on, 56(6):3442-3456, Nov. 2007.   DOI
8 Young-Hoon Park, and Seung-Woo Seo, "Scheme for Verification Between Mobile Devices in a Service with Expiration Time by Using Zeroknowledge Proof", in Journal of the Institute of Electronics Engineers of Korea Vol. 50 No.3, pp. 23-32, Mar. 2013
9 Y. Kawahara, T. Takagi, and E. Okamoto. "Efficient Implementation of Tate Pairing on a Mobile Phone Using Java," In Computational Intelligence and Security, Lecture Notes In Artificial Intelligence, Vol. 4456. Springer-Verlag, Berlin, Heidelberg 396-405.
10 S. D. Galbraith, K. Harrison, and D. Soldera. 2002. "Implementing the Tate Pairing," In Proceedings of the 5th International Symposium on Algorithmic Number Theory (ANTS-V), Claus Fieker and David R. Kohel (Eds.). Springer-Verlag, London, UK, UK, 324-337.
11 WooKwon Koo, JungYeon Hwang, Hyoung-Joong Kim, and DongHoon Lee, "ID-Based Proxy Reencryption Scheme with Chosen-CiphertextSecurity", in Journal of the Institute of Electronics Engineers of Korea Vol. 46 No. 3, pp. 64-77, Jan. 2009
12 Anca-Andreea Ivan and Yevgeniy Dodis. Proxy Cryptography Revisited. In NDSS. The Internet Society, 2003.
13 Ran Canetti and Susan Hohenberger. 2007. Chosen-ciphertext secure proxy re-encryption. In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 185-194.