Font Size: a A A

User Privacy Data Protection Based On Optimized Proxy Re-encryption In Cloud

Posted on:2014-08-03Degree:MasterType:Thesis
Country:ChinaCandidate:H W ChenFull Text:PDF
GTID:2268330422963431Subject:Information security
Abstract/Summary:PDF Full Text Request
In cloud computing, security issues are a major problem for the cloud to the rapiddevelopment. While data security is directly related to the benefits of users. User datastored in the cloud environment media could not controlled by users themselves, the userhas not the control power of their own data. In order to protect the user’s privacy data, thecommon method is to encrypt the data, but a simple encryption algorithm cannot solve theuser has no control power of the data. At the same time, multiple keys would be required inorder to achieve fine-grained control for data access, this made a heavy burden for users tomanagement their keys.Base on the characteristics and data security requirements for cloud environment,combined with AES symmetric encryption and proxy re-encryption algorithm, with theoptimization of identity-based proxy re-encryption algorithm, we provided a scheme ofmulti-security-level privacy data protection interfaces, The optimization includes supportfine-grained control and performance optimization. Through combination of attribute-basedencryption, we added a fine-grained control factor to our algorithm. so that each authorizeoperation only valid for one factor. By reducing the number of bilinear mapping what mosttime-consuming, we achieved the purpose of optimizing performance. Last but not the least,the heterogeneity also realizes the secure data share between two heterogeneous cloudsystems, which are equipped with different cryptographic primitives.According to experiments, user privacy data protection based on optimized proxyre-encryption implement the services of data stored directly, AES transparent encryption,proxy re-encryption protection support fine-grained and ciphertext heterogeneoustransformation and other functions such as authentication, data and friends management. Inperformance, we achieved30%time-cost reduction for the entire process and53.5%time-cost reduction for delegation and56.4%time-cost reduction for decryption.
Keywords/Search Tags:Privacy Protection, Proxy Re-encryption, Fine-grained, Cloud Security
PDF Full Text Request
Related items