Untraceable off-line cash in wallet with observers
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
A break in the clouds: towards a cloud definition
ACM SIGCOMM Computer Communication Review
Digital signature schemes with restriction on signing capability
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Cloud computing is a new computing paradigm wherein the resources of the computing infrastructure are provided as services over the internet. The benefits offered by the public cloud encourage the data owners/organisations to store their data on to the cloud storage provided by the cloud storage provider. Cloud computing poses new security challenges as the users outsource their data to public cloud. Building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the data owner is a security challenge. The existing popular storage services does not provide cryptographic guarantee for the security. They are often guided by service level agreements and policies. In this paper, we propose and implement a secure storage service providing a cryptographic guarantee for the security to store, access and share the user's data. We propose the notion of limited proxy re-encryption scheme to restrict the proxy from re-encrypting more than specified number of delegator's ciphertexts. We give the security model and analyse the scheme for security. We use the proposed limited proxy re-encryption scheme as the primitive and design an improved and efficient sharing method for the secure storage service.