JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Method of Changing Password for Secure Cloud Storage based on Proxy Re-encryption Scheme
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Method of Changing Password for Secure Cloud Storage based on Proxy Re-encryption Scheme
Park, Young-Hoon; Seo, Seung-Woo;
  PDF(new window)
 Abstract
In cloud storages, as security of stored files and privacy of users become regarded as important concerns, secure cloud storages have been proposed, where stored files are encrypted with file owner`s password and even the cloud service provider can not open the file contents. However, if the file owner forgets one`s password, one can no longer access the file. To solve this problem, we propose a scheme for changing password for the secure cloud based on proxy re-encryption, which make the file owner enable to change password even when one forgets it. With the proposed scheme, only the file owner can change the password and re-encrypt the files securely because other user and even the service provider can not see the file contents.
 Keywords
보안 클라우드;프록시 재암호화;공개키 암호화;
 Language
Korean
 Cited by
 References
1.
Fei Chen, Tao Xiang, Yuanyuan Yang, and Chow S.S.M., "Secure cloud storage meets with secure network coding," in INFOCOM, 2014 Proceedings IEEE, vol., no., pp.673-681, April 27 2014-May 2 2014

2.
Cong Wang, Chow, S.S.M., Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," in Computers, IEEE Transactions on , vol.62, no.2, pp.362-375, Feb. 2013 crossref(new window)

3.
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. "Provable data possession at untrusted stores," in Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 598-609.

4.
https://spideroak.com/

5.
https://www.boxcryptor.com/

6.
D. Boneh, and M. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., 32(3):586-615, Mar 2003. crossref(new window)

7.
X. Lin, X. Sun, P. Ho, and X. Shen. "GSIS: A secure and privacy-preserving protocol for vehicular communications," Vehicular Technology, IEEE Transactions on, 56(6):3442-3456, Nov. 2007. crossref(new window)

8.
Young-Hoon Park, and Seung-Woo Seo, "Scheme for Verification Between Mobile Devices in a Service with Expiration Time by Using Zeroknowledge Proof", in Journal of the Institute of Electronics Engineers of Korea Vol. 50 No.3, pp. 23-32, Mar. 2013

9.
Y. Kawahara, T. Takagi, and E. Okamoto. "Efficient Implementation of Tate Pairing on a Mobile Phone Using Java," In Computational Intelligence and Security, Lecture Notes In Artificial Intelligence, Vol. 4456. Springer-Verlag, Berlin, Heidelberg 396-405.

10.
S. D. Galbraith, K. Harrison, and D. Soldera. 2002. "Implementing the Tate Pairing," In Proceedings of the 5th International Symposium on Algorithmic Number Theory (ANTS-V), Claus Fieker and David R. Kohel (Eds.). Springer-Verlag, London, UK, UK, 324-337.

11.
WooKwon Koo, JungYeon Hwang, Hyoung-Joong Kim, and DongHoon Lee, "ID-Based Proxy Reencryption Scheme with Chosen-CiphertextSecurity", in Journal of the Institute of Electronics Engineers of Korea Vol. 46 No. 3, pp. 64-77, Jan. 2009

12.
Anca-Andreea Ivan and Yevgeniy Dodis. Proxy Cryptography Revisited. In NDSS. The Internet Society, 2003.

13.
Ran Canetti and Susan Hohenberger. 2007. Chosen-ciphertext secure proxy re-encryption. In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 185-194.