مشخصات مقاله | |
ترجمه عنوان مقاله | حفظ حریم خصوصی آفلاین با رمزگذاری مجدد پروکسی در محاسبات ابری موبایل |
عنوان انگلیسی مقاله | Offline privacy preserving proxy re-encryption in mobile cloud computing |
انتشار | مقاله سال 2019 |
تعداد صفحات مقاله انگلیسی | 12 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | Scopus – Master Journals List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
3.504 در سال 2019 |
شاخص H_index | 53 در سال 2020 |
شاخص SJR | 0.461 در سال 2019 |
شناسه ISSN | 1574-1192 |
شاخص Quartile (چارک) | Q1 در سال 2019 |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | دارد |
رفرنس | دارد |
رشته های مرتبط | کامپیوتر، فناوری اطلاعات و ارتباطات |
گرایش های مرتبط | امنیت اطلاعات، مهندسی نرم افزار، رایانش ابری، مخابرات سیار، دیتا و امنیت شبکه |
نوع ارائه مقاله |
ژورنال |
مجله | محاسبات فراگیر و محاسبات موبایل – Pervasive And Mobile Computing |
دانشگاه | College of Information Science and Engineering, Hunan University, Changsha 410082, China Hunan Provincial Key Laboratory of Dependable Systems and Networks, Changsha 410082, China |
کلمات کلیدی | احراز هویت، مجوز، رمزگذاری مبتنی بر ویژگی خط مشی متن رمزی، محاسبات ابری موبایل، رمزگذاری مجدد پروکسی |
کلمات کلیدی انگلیسی | Authentication، Authorization، Ciphertext policy attribute-based encryption، Mobile cloud computing، Proxy re-encryption |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.pmcj.2019.101081 |
کد محصول | E14363 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
1- Introduction 2- Related works 3- Preliminaries 4- Problem statement 5- Cloud-based multi-authority ABE access control and offline proxy re-encryption 6- Security analysis 7- Performance analysis 8- Discussion 9- Conclusion References |
بخشی از متن مقاله: |
Abstract This paper addresses the always online behavior of the data owner in proxy re-encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued to legitimate users. An in depth analysis shows that our scheme is secure, flexible and efficient for mobile cloud computing. Introduction Mobile cloud computing enables mobile devices to perform heavy resource-demanding tasks thanks to the availability of cloud-based resources through heterogeneous wireless networks. An exhaustive description of mobile cloud computing (MCC) architecture can be found in [1]. As more mobile devices are increasingly being used nowadays to store and process personal and corporate data [2], there are growing concerns regarding the privacy and confidentiality of sensitive data as the device can be stolen, compromised or hacked. Moreover, applications running on the mobile device should consume the least possible amount of energy. Therefore, any security solution designed for mobile cloud data storage should be mobile device resource-friendly. The main drawback of outsourcing data to the cloud is that sensitive data can be accessed by a breached cloud service provider (CSP), as well as by some unauthorized users, leading to a confidentiality breach. Encryption has been proposed as a solution to secure data. However, only a limited number of operations can be performed on encrypted data, with one operation of interest being the search over encrypted cloud data as described in [3]. Requiring the user to download all the encrypted data locally before attempting decryption incurs many inconveniences among which, a high data transmission overload and, due to the cloud computing principle of pay-as-you-go, high financial expenditures. Such scheme additionally poses a problem of user authentication and authorization as arbitrary ciphertexts from different data owners can directly be accessed by any user without prior authorization mean. |