z-logo
Premium
Obfuscation for multi‐use re‐encryption and its application in cloud computing
Author(s) -
Cheng Rong,
Zhang Fangguo
Publication year - 2014
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.3399
Subject(s) - cloud computing , obfuscation , encryption , computer science , client side encryption , computer security , cloud computing security , filesystem level encryption , on the fly encryption , operating system
Summary With the rapid development of cloud computing, more and more data are being centralized into cloud server for sharing. It is a challenge problem on how to keep them both private and accessible. Re‐encryption function is a useful tool to fulfill secure cloud computing. Cloud data owners store their encrypted data on the cloud server. When other cloud users want to share the cloud data, cloud server can re‐encrypt the encrypted data for them. So data on the cloud server can be both accessible and private. Secure obfuscation for re‐encryption function can hide all the private information in the re‐encryption function, so the obfuscated program can be directly outsourced to cloud server without leaking anything about the computation task. In this paper, we study on secure obfuscation for three kinds of new re‐encryption functions: multi‐use re‐encryption, conditional re‐encryption with keyword search, and broadcast re‐encryption. We utilize the obfuscated results as tools to fulfill secure cloud computing. Cloud‐computing schemes based on obfuscation have better security compared with other tools. Copyright © 2014 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here