TY - JOUR
T1 - A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context
AU - Wang, Kun
AU - Yu, Jiahui
AU - Liu, Xiulong
AU - Guo, Song
N1 - Funding Information:
This work is supported by NSFC (61572262, 61533010, 61373135, 61571233, 61532013); National China 973 Project (2015CB352401); the NSF of Jiangsu Province (BK20141427); The Qinlan Project of Jiangsu Province; China Postdoctoral Science Foundation.
Publisher Copyright:
© 2015 IEEE.
PY - 2021/9/1
Y1 - 2021/9/1
N2 - With the growing amount of data, the demand of big data storage significantly increases. Through the cloud center, data providers can conveniently share data stored in the center with others. However, one practically important problem in big data storage is privacy. During the sharing process, data is encrypted to be confidential and anonymous. Such operation can protect privacy from being leaked out. To satisfy the practical conditions, data tranmission with multi receivers is also considered. Furthermore, this paper proposes the notion of pre-authentication for the first time, i.e., only users with certain attributes that have already been authenticated can participate in the data transmission. The pre-authentication mechanism combines the advantages of proxy conditional re-encryption multi-sharing mechanism with the attribute-based authentication technique, thus achieving attributes authentication before re-encryption, and ensuring the security of the attributes and data. Finally this paper proves that the system can resist several attacks and the proposed pre-authentication mechanism could significantly enhance the system security level.
AB - With the growing amount of data, the demand of big data storage significantly increases. Through the cloud center, data providers can conveniently share data stored in the center with others. However, one practically important problem in big data storage is privacy. During the sharing process, data is encrypted to be confidential and anonymous. Such operation can protect privacy from being leaked out. To satisfy the practical conditions, data tranmission with multi receivers is also considered. Furthermore, this paper proposes the notion of pre-authentication for the first time, i.e., only users with certain attributes that have already been authenticated can participate in the data transmission. The pre-authentication mechanism combines the advantages of proxy conditional re-encryption multi-sharing mechanism with the attribute-based authentication technique, thus achieving attributes authentication before re-encryption, and ensuring the security of the attributes and data. Finally this paper proves that the system can resist several attacks and the proposed pre-authentication mechanism could significantly enhance the system security level.
KW - big data
KW - pre-authentication
KW - Privacy-preserving
KW - proxy re-encryption
UR - http://www.scopus.com/inward/record.url?scp=85112728062&partnerID=8YFLogxK
U2 - 10.1109/TBDATA.2017.2702176
DO - 10.1109/TBDATA.2017.2702176
M3 - Journal article
AN - SCOPUS:85112728062
SN - 2332-7790
VL - 7
SP - 657
EP - 667
JO - IEEE Transactions on Big Data
JF - IEEE Transactions on Big Data
IS - 4
M1 - 7921569
ER -