Author:
Xu Zhenwu,Shen Jinan,Liang Fang,Chen Yingjie, ,
Abstract
Cloud storage technology has attracted a considerable number of users owing to its exponential growth. Storing data in the cloud can save the resources of local storage configuration and reduce the cost of local hardware investment. However, the data stored in the cloud is out of the physical control (out of control) of the user. Based on the service characteristics of the cloud environment and the security requirements of user privacy data in the cloud environment, this paper proposes an improved identity proxy re-encryption algorithm based on the advanced encryption standard algorithm. The performance of the algorithm is optimized by reducing the number of bilinear mapping operations, whose calculation takes the longest time in the proxy re-encryption scheme. Only two bilinear mapping operations are required in this scheme. In addition, the encrypted data are tested to different degrees. The experimental results show that this scheme satisfies encryption and decryption performance requirements of the user.
Funder
National Natural Science Foundation of China
Incubation Project for High-Level Scientific Research Achievements of Hubei Minzu University
Publisher
Fuji Technology Press Ltd.
Subject
Artificial Intelligence,Computer Vision and Pattern Recognition,Human-Computer Interaction
Reference20 articles.
1. Y. Liu, “Image Encryption Algorithm Based on a Hyperchaotic System and Fractional Fourier Transform,” J. Adv. Comput. Intell. Intell. Inform., Vol.23, No.5, pp. 805-809, 2019.
2. Z. Xu, J. Shen, P. Luo, and F. Liang, “PVcon: Localizing Hidden Concurrency Errors with Prediction and Verification,” IEEE Access, Vol.8, pp. 165373-165386, 2020.
3. M. Armbrust, A. Fox, R. Griffith et al., “A view of cloud computing,” Communications of the ACM, Vol.53, No.4, pp. 50-58, 2010.
4. D. E. Bell and L. J. LaPadula, “Secure computer systems: mathematical foundations and model,” Mitre Corporation, 1974.
5. A. Shamir, “Identity-based cryptosystems and signature schemes,” Lecture Notes in Computer Science: Workshop on the Theory and Application of Cryptographic Techniques (Crypto 1984), Vol.196, pp. 47-53, 1984.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献