Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud

With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2020, Vol.15, p.3168-3180
Hauptverfasser: Deng, Hua, Qin, Zheng, Wu, Qianhong, Guan, Zhenyu, Deng, Robert H., Wang, Yujue, Zhou, Yunya
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3180
container_issue
container_start_page 3168
container_title IEEE transactions on information forensics and security
container_volume 15
creator Deng, Hua
Qin, Zheng
Wu, Qianhong
Guan, Zhenyu
Deng, Robert H.
Wang, Yujue
Zhou, Yunya
description With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-based encryption (IBE) and identity-based broadcast encryption (IBBE). In IBET, data users are identified and authorized for data access based on their recognizable identities, which avoids complicated certificate management in usual secure distributed systems. More importantly, IBET provides a transformation mechanism that converts an IBE ciphertext into an IBBE ciphertext so that a new group of users not specified during the IBE encryption can access the underlying data. We design a concrete IBET scheme based on bilinear groups and prove its security against powerful attacks. Thorough theoretical and experimental analyses demonstrate the high efficiency and practicability of the proposed scheme.
doi_str_mv 10.1109/TIFS.2020.2985532
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2393780052</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9056799</ieee_id><sourcerecordid>2393780052</sourcerecordid><originalsourceid>FETCH-LOGICAL-c384t-ad0b22e360a96f980b9667163510c3b86846f10fa51716d928bdff3060b9dca73</originalsourceid><addsrcrecordid>eNo9kF1LwzAUhoMoOKc_QLwJeN16kjRpcqlz08FAYfM6pG2iGV07kxbcv7dzc1fng_c5Bx6EbgmkhIB6WM1ny5QChZQqyTmjZ2hEOBeJAErOTz1hl-gqxjVAlhEhR0jPK9t0vtslTybaCk-bMuy2nW8bvAqmia4NG_M3Dh2e1fbHF7XFyy8TfPOJW_dPDOyz6Qz2DX7vi9qXeFK3fXWNLpypo7051jH6mE1Xk9dk8fYynzwukpLJrEtMBQWllgkwSjgloVBC5EQwTqBkhRQyE46AM5wM20pRWVTOMRBDsCpNzsbo_nB3G9rv3sZOr9s-NMNLTZliuQTgdEiRQ6oMbYzBOr0NfmPCThPQe49671HvPeqjx4G5OzDeWnvKK-AiV4r9Ah9zbj0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2393780052</pqid></control><display><type>article</type><title>Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud</title><source>IEEE Xplore</source><creator>Deng, Hua ; Qin, Zheng ; Wu, Qianhong ; Guan, Zhenyu ; Deng, Robert H. ; Wang, Yujue ; Zhou, Yunya</creator><creatorcontrib>Deng, Hua ; Qin, Zheng ; Wu, Qianhong ; Guan, Zhenyu ; Deng, Robert H. ; Wang, Yujue ; Zhou, Yunya</creatorcontrib><description>With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-based encryption (IBE) and identity-based broadcast encryption (IBBE). In IBET, data users are identified and authorized for data access based on their recognizable identities, which avoids complicated certificate management in usual secure distributed systems. More importantly, IBET provides a transformation mechanism that converts an IBE ciphertext into an IBBE ciphertext so that a new group of users not specified during the IBE encryption can access the underlying data. We design a concrete IBET scheme based on bilinear groups and prove its security against powerful attacks. Thorough theoretical and experimental analyses demonstrate the high efficiency and practicability of the proposed scheme.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2020.2985532</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Access control ; Algorithms ; Cloud computing ; Computer networks ; cryptographic encryption ; Data privacy ; data sharing ; Encryption ; Public key cryptography ; Service introduction ; Transformations</subject><ispartof>IEEE transactions on information forensics and security, 2020, Vol.15, p.3168-3180</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c384t-ad0b22e360a96f980b9667163510c3b86846f10fa51716d928bdff3060b9dca73</citedby><cites>FETCH-LOGICAL-c384t-ad0b22e360a96f980b9667163510c3b86846f10fa51716d928bdff3060b9dca73</cites><orcidid>0000-0002-0089-0870 ; 0000-0003-0877-3887 ; 0000-0002-0951-8880 ; 0000-0003-3491-8146 ; 0000-0002-3959-338X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9056799$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,4010,27900,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9056799$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Deng, Hua</creatorcontrib><creatorcontrib>Qin, Zheng</creatorcontrib><creatorcontrib>Wu, Qianhong</creatorcontrib><creatorcontrib>Guan, Zhenyu</creatorcontrib><creatorcontrib>Deng, Robert H.</creatorcontrib><creatorcontrib>Wang, Yujue</creatorcontrib><creatorcontrib>Zhou, Yunya</creatorcontrib><title>Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-based encryption (IBE) and identity-based broadcast encryption (IBBE). In IBET, data users are identified and authorized for data access based on their recognizable identities, which avoids complicated certificate management in usual secure distributed systems. More importantly, IBET provides a transformation mechanism that converts an IBE ciphertext into an IBBE ciphertext so that a new group of users not specified during the IBE encryption can access the underlying data. We design a concrete IBET scheme based on bilinear groups and prove its security against powerful attacks. Thorough theoretical and experimental analyses demonstrate the high efficiency and practicability of the proposed scheme.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Cloud computing</subject><subject>Computer networks</subject><subject>cryptographic encryption</subject><subject>Data privacy</subject><subject>data sharing</subject><subject>Encryption</subject><subject>Public key cryptography</subject><subject>Service introduction</subject><subject>Transformations</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kF1LwzAUhoMoOKc_QLwJeN16kjRpcqlz08FAYfM6pG2iGV07kxbcv7dzc1fng_c5Bx6EbgmkhIB6WM1ny5QChZQqyTmjZ2hEOBeJAErOTz1hl-gqxjVAlhEhR0jPK9t0vtslTybaCk-bMuy2nW8bvAqmia4NG_M3Dh2e1fbHF7XFyy8TfPOJW_dPDOyz6Qz2DX7vi9qXeFK3fXWNLpypo7051jH6mE1Xk9dk8fYynzwukpLJrEtMBQWllgkwSjgloVBC5EQwTqBkhRQyE46AM5wM20pRWVTOMRBDsCpNzsbo_nB3G9rv3sZOr9s-NMNLTZliuQTgdEiRQ6oMbYzBOr0NfmPCThPQe49671HvPeqjx4G5OzDeWnvKK-AiV4r9Ah9zbj0</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Deng, Hua</creator><creator>Qin, Zheng</creator><creator>Wu, Qianhong</creator><creator>Guan, Zhenyu</creator><creator>Deng, Robert H.</creator><creator>Wang, Yujue</creator><creator>Zhou, Yunya</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-0089-0870</orcidid><orcidid>https://orcid.org/0000-0003-0877-3887</orcidid><orcidid>https://orcid.org/0000-0002-0951-8880</orcidid><orcidid>https://orcid.org/0000-0003-3491-8146</orcidid><orcidid>https://orcid.org/0000-0002-3959-338X</orcidid></search><sort><creationdate>2020</creationdate><title>Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud</title><author>Deng, Hua ; Qin, Zheng ; Wu, Qianhong ; Guan, Zhenyu ; Deng, Robert H. ; Wang, Yujue ; Zhou, Yunya</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c384t-ad0b22e360a96f980b9667163510c3b86846f10fa51716d928bdff3060b9dca73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Cloud computing</topic><topic>Computer networks</topic><topic>cryptographic encryption</topic><topic>Data privacy</topic><topic>data sharing</topic><topic>Encryption</topic><topic>Public key cryptography</topic><topic>Service introduction</topic><topic>Transformations</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Deng, Hua</creatorcontrib><creatorcontrib>Qin, Zheng</creatorcontrib><creatorcontrib>Wu, Qianhong</creatorcontrib><creatorcontrib>Guan, Zhenyu</creatorcontrib><creatorcontrib>Deng, Robert H.</creatorcontrib><creatorcontrib>Wang, Yujue</creatorcontrib><creatorcontrib>Zhou, Yunya</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Deng, Hua</au><au>Qin, Zheng</au><au>Wu, Qianhong</au><au>Guan, Zhenyu</au><au>Deng, Robert H.</au><au>Wang, Yujue</au><au>Zhou, Yunya</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2020</date><risdate>2020</risdate><volume>15</volume><spage>3168</spage><epage>3180</epage><pages>3168-3180</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-based encryption (IBE) and identity-based broadcast encryption (IBBE). In IBET, data users are identified and authorized for data access based on their recognizable identities, which avoids complicated certificate management in usual secure distributed systems. More importantly, IBET provides a transformation mechanism that converts an IBE ciphertext into an IBBE ciphertext so that a new group of users not specified during the IBE encryption can access the underlying data. We design a concrete IBET scheme based on bilinear groups and prove its security against powerful attacks. Thorough theoretical and experimental analyses demonstrate the high efficiency and practicability of the proposed scheme.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2020.2985532</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0002-0089-0870</orcidid><orcidid>https://orcid.org/0000-0003-0877-3887</orcidid><orcidid>https://orcid.org/0000-0002-0951-8880</orcidid><orcidid>https://orcid.org/0000-0003-3491-8146</orcidid><orcidid>https://orcid.org/0000-0002-3959-338X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2020, Vol.15, p.3168-3180
issn 1556-6013
1556-6021
language eng
recordid cdi_proquest_journals_2393780052
source IEEE Xplore
subjects Access control
Algorithms
Cloud computing
Computer networks
cryptographic encryption
Data privacy
data sharing
Encryption
Public key cryptography
Service introduction
Transformations
title Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T08%3A50%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Identity-Based%20Encryption%20Transformation%20for%20Flexible%20Sharing%20of%20Encrypted%20Data%20in%20Public%20Cloud&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Deng,%20Hua&rft.date=2020&rft.volume=15&rft.spage=3168&rft.epage=3180&rft.pages=3168-3180&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2020.2985532&rft_dat=%3Cproquest_RIE%3E2393780052%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2393780052&rft_id=info:pmid/&rft_ieee_id=9056799&rfr_iscdi=true