Browse > Article
http://dx.doi.org/10.7840/KICS.2012.37B.4.288

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment  

Song, You-Jin (동국대학교 정보경영학과)
Do, Jeong-Min (동국대학교 일반대학원 전자상거래협동과정)
Abstract
To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.
Keywords
Key Policy-Attribute Based Encryption; Proxy Re-Encryption; Data Confidentiality; Collusion Attack; Access Control;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y.Yun, B.Kim, "Mobile Cloud Computing Technology Trend", NIPA, Weekly Technology Trend Vol.1439, pp.28-39, 2010.
2 V. Goyal, O.ng Pandey, A. Sahai and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," Association for Computing Machinery, in Proc. of CCS'06, 2006.
3 J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," IEEE Computer Society, Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp.321-334, 2007.
4 M. Blaze, G. Bleumer and M. Strauss, "Divertible protocols and atomic proxy cryptography", EUROCRYPT, Proceedings of Eurocrypt '98, Volume 1403, 1998.
5 J. Benaloh, M. Chase, E. Horvitz and K. Lauter, "Patient controlled encryption: ensuring privacy of electronic medical records," Association for Computing Machinery, Proceedings of the 2009 ACM workshop on Cloud computing security, pp.103-114, 2009.
6 L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel and W. Jonker, "Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes," 2009 University of Twente, Centre for Telematics and Information Technology, Internal Report, 2009.
7 D.Kim, K.Jang, D.Shin, "Healthcare System using Agent Platform in Ubiquitous Environment,", Korean Society For Internet Information, Proceedings of Korean Society For Internet Information, pp. 139-142, 2006
8 Y.Min, H.Kim, Y.Kim, "Distributed File System Technology for Cloud Computing," Korean Institute of Information Scientists and Engineers, pp.86-94, 2009.
9 D.Yu, S.Jeong, T.Kim, "TIPC Application and Analysis for Network I/O Performance Evaluation in Hadoop based Distributed Computing," Korean Institute of Information Scientists and Engineers, pp.351-359, 2009.
10 O.Min, H.Kim, G.Nam, "Cloud Computing Technology Trend," ETRI, ETTrends, Vol.24 No.4, pp.1-13, 2009.
11 H.Kim, U.Min, G.Nam, "Mobile Cloud Computing Technology Trend," ETRI, ETTrends, Vol.25 No.3, pp.40-51, 2010.
12 S.C. Yu, C. Wang, K.I. Ren and W.J. Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing," INFOCOM, 2010 Proceedings IEEE, pp.321-334, 2010.
13 T. Mather, S. Kumaraswamy and S. Latif, "Cloud Security and Privacy," O'Reilly Media, 2009.
14 CSA, Security Guidance for Critical Areas of Focus Cloud Computing, Vol.2.1, 2009.