Identity-Based Data Storage in Cloud Computing

Download Now
Provided by: University of Wisconsin–River Falls
Topic: Cloud
Format: PDF
Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from the same domain (intra-domain) are considered. The authors note that one of the main applications of identity-based proxy re-encryption schemes is in the cloud computing scenario.
Download Now

Find By Topic