Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud
With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data....
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2020, Vol.15, p.3168-3180 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3180 |
---|---|
container_issue | |
container_start_page | 3168 |
container_title | IEEE transactions on information forensics and security |
container_volume | 15 |
creator | Deng, Hua Qin, Zheng Wu, Qianhong Guan, Zhenyu Deng, Robert H. Wang, Yujue Zhou, Yunya |
description | With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-based encryption (IBE) and identity-based broadcast encryption (IBBE). In IBET, data users are identified and authorized for data access based on their recognizable identities, which avoids complicated certificate management in usual secure distributed systems. More importantly, IBET provides a transformation mechanism that converts an IBE ciphertext into an IBBE ciphertext so that a new group of users not specified during the IBE encryption can access the underlying data. We design a concrete IBET scheme based on bilinear groups and prove its security against powerful attacks. Thorough theoretical and experimental analyses demonstrate the high efficiency and practicability of the proposed scheme. |
doi_str_mv | 10.1109/TIFS.2020.2985532 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2393780052</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9056799</ieee_id><sourcerecordid>2393780052</sourcerecordid><originalsourceid>FETCH-LOGICAL-c384t-ad0b22e360a96f980b9667163510c3b86846f10fa51716d928bdff3060b9dca73</originalsourceid><addsrcrecordid>eNo9kF1LwzAUhoMoOKc_QLwJeN16kjRpcqlz08FAYfM6pG2iGV07kxbcv7dzc1fng_c5Bx6EbgmkhIB6WM1ny5QChZQqyTmjZ2hEOBeJAErOTz1hl-gqxjVAlhEhR0jPK9t0vtslTybaCk-bMuy2nW8bvAqmia4NG_M3Dh2e1fbHF7XFyy8TfPOJW_dPDOyz6Qz2DX7vi9qXeFK3fXWNLpypo7051jH6mE1Xk9dk8fYynzwukpLJrEtMBQWllgkwSjgloVBC5EQwTqBkhRQyE46AM5wM20pRWVTOMRBDsCpNzsbo_nB3G9rv3sZOr9s-NMNLTZliuQTgdEiRQ6oMbYzBOr0NfmPCThPQe49671HvPeqjx4G5OzDeWnvKK-AiV4r9Ah9zbj0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2393780052</pqid></control><display><type>article</type><title>Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud</title><source>IEEE Xplore</source><creator>Deng, Hua ; Qin, Zheng ; Wu, Qianhong ; Guan, Zhenyu ; Deng, Robert H. ; Wang, Yujue ; Zhou, Yunya</creator><creatorcontrib>Deng, Hua ; Qin, Zheng ; Wu, Qianhong ; Guan, Zhenyu ; Deng, Robert H. ; Wang, Yujue ; Zhou, Yunya</creatorcontrib><description>With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-based encryption (IBE) and identity-based broadcast encryption (IBBE). In IBET, data users are identified and authorized for data access based on their recognizable identities, which avoids complicated certificate management in usual secure distributed systems. More importantly, IBET provides a transformation mechanism that converts an IBE ciphertext into an IBBE ciphertext so that a new group of users not specified during the IBE encryption can access the underlying data. We design a concrete IBET scheme based on bilinear groups and prove its security against powerful attacks. Thorough theoretical and experimental analyses demonstrate the high efficiency and practicability of the proposed scheme.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2020.2985532</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Access control ; Algorithms ; Cloud computing ; Computer networks ; cryptographic encryption ; Data privacy ; data sharing ; Encryption ; Public key cryptography ; Service introduction ; Transformations</subject><ispartof>IEEE transactions on information forensics and security, 2020, Vol.15, p.3168-3180</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c384t-ad0b22e360a96f980b9667163510c3b86846f10fa51716d928bdff3060b9dca73</citedby><cites>FETCH-LOGICAL-c384t-ad0b22e360a96f980b9667163510c3b86846f10fa51716d928bdff3060b9dca73</cites><orcidid>0000-0002-0089-0870 ; 0000-0003-0877-3887 ; 0000-0002-0951-8880 ; 0000-0003-3491-8146 ; 0000-0002-3959-338X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9056799$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,4010,27900,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9056799$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Deng, Hua</creatorcontrib><creatorcontrib>Qin, Zheng</creatorcontrib><creatorcontrib>Wu, Qianhong</creatorcontrib><creatorcontrib>Guan, Zhenyu</creatorcontrib><creatorcontrib>Deng, Robert H.</creatorcontrib><creatorcontrib>Wang, Yujue</creatorcontrib><creatorcontrib>Zhou, Yunya</creatorcontrib><title>Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-based encryption (IBE) and identity-based broadcast encryption (IBBE). In IBET, data users are identified and authorized for data access based on their recognizable identities, which avoids complicated certificate management in usual secure distributed systems. More importantly, IBET provides a transformation mechanism that converts an IBE ciphertext into an IBBE ciphertext so that a new group of users not specified during the IBE encryption can access the underlying data. We design a concrete IBET scheme based on bilinear groups and prove its security against powerful attacks. Thorough theoretical and experimental analyses demonstrate the high efficiency and practicability of the proposed scheme.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Cloud computing</subject><subject>Computer networks</subject><subject>cryptographic encryption</subject><subject>Data privacy</subject><subject>data sharing</subject><subject>Encryption</subject><subject>Public key cryptography</subject><subject>Service introduction</subject><subject>Transformations</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kF1LwzAUhoMoOKc_QLwJeN16kjRpcqlz08FAYfM6pG2iGV07kxbcv7dzc1fng_c5Bx6EbgmkhIB6WM1ny5QChZQqyTmjZ2hEOBeJAErOTz1hl-gqxjVAlhEhR0jPK9t0vtslTybaCk-bMuy2nW8bvAqmia4NG_M3Dh2e1fbHF7XFyy8TfPOJW_dPDOyz6Qz2DX7vi9qXeFK3fXWNLpypo7051jH6mE1Xk9dk8fYynzwukpLJrEtMBQWllgkwSjgloVBC5EQwTqBkhRQyE46AM5wM20pRWVTOMRBDsCpNzsbo_nB3G9rv3sZOr9s-NMNLTZliuQTgdEiRQ6oMbYzBOr0NfmPCThPQe49671HvPeqjx4G5OzDeWnvKK-AiV4r9Ah9zbj0</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Deng, Hua</creator><creator>Qin, Zheng</creator><creator>Wu, Qianhong</creator><creator>Guan, Zhenyu</creator><creator>Deng, Robert H.</creator><creator>Wang, Yujue</creator><creator>Zhou, Yunya</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-0089-0870</orcidid><orcidid>https://orcid.org/0000-0003-0877-3887</orcidid><orcidid>https://orcid.org/0000-0002-0951-8880</orcidid><orcidid>https://orcid.org/0000-0003-3491-8146</orcidid><orcidid>https://orcid.org/0000-0002-3959-338X</orcidid></search><sort><creationdate>2020</creationdate><title>Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud</title><author>Deng, Hua ; Qin, Zheng ; Wu, Qianhong ; Guan, Zhenyu ; Deng, Robert H. ; Wang, Yujue ; Zhou, Yunya</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c384t-ad0b22e360a96f980b9667163510c3b86846f10fa51716d928bdff3060b9dca73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Cloud computing</topic><topic>Computer networks</topic><topic>cryptographic encryption</topic><topic>Data privacy</topic><topic>data sharing</topic><topic>Encryption</topic><topic>Public key cryptography</topic><topic>Service introduction</topic><topic>Transformations</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Deng, Hua</creatorcontrib><creatorcontrib>Qin, Zheng</creatorcontrib><creatorcontrib>Wu, Qianhong</creatorcontrib><creatorcontrib>Guan, Zhenyu</creatorcontrib><creatorcontrib>Deng, Robert H.</creatorcontrib><creatorcontrib>Wang, Yujue</creatorcontrib><creatorcontrib>Zhou, Yunya</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Deng, Hua</au><au>Qin, Zheng</au><au>Wu, Qianhong</au><au>Guan, Zhenyu</au><au>Deng, Robert H.</au><au>Wang, Yujue</au><au>Zhou, Yunya</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2020</date><risdate>2020</risdate><volume>15</volume><spage>3168</spage><epage>3180</epage><pages>3168-3180</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-based encryption (IBE) and identity-based broadcast encryption (IBBE). In IBET, data users are identified and authorized for data access based on their recognizable identities, which avoids complicated certificate management in usual secure distributed systems. More importantly, IBET provides a transformation mechanism that converts an IBE ciphertext into an IBBE ciphertext so that a new group of users not specified during the IBE encryption can access the underlying data. We design a concrete IBET scheme based on bilinear groups and prove its security against powerful attacks. Thorough theoretical and experimental analyses demonstrate the high efficiency and practicability of the proposed scheme.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2020.2985532</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0002-0089-0870</orcidid><orcidid>https://orcid.org/0000-0003-0877-3887</orcidid><orcidid>https://orcid.org/0000-0002-0951-8880</orcidid><orcidid>https://orcid.org/0000-0003-3491-8146</orcidid><orcidid>https://orcid.org/0000-0002-3959-338X</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2020, Vol.15, p.3168-3180 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_proquest_journals_2393780052 |
source | IEEE Xplore |
subjects | Access control Algorithms Cloud computing Computer networks cryptographic encryption Data privacy data sharing Encryption Public key cryptography Service introduction Transformations |
title | Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T08%3A50%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Identity-Based%20Encryption%20Transformation%20for%20Flexible%20Sharing%20of%20Encrypted%20Data%20in%20Public%20Cloud&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Deng,%20Hua&rft.date=2020&rft.volume=15&rft.spage=3168&rft.epage=3180&rft.pages=3168-3180&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2020.2985532&rft_dat=%3Cproquest_RIE%3E2393780052%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2393780052&rft_id=info:pmid/&rft_ieee_id=9056799&rfr_iscdi=true |