TITLE | A Proxy Re Encryption Model for Secure and Confidential Cloud Data Sharing |
---|---|
ABSTRACT | Cloud storage and cloud sharing services have become ubiquitous, but they also raise concerns about data confidentiality when data owners delegate access. Proxy ReEncryption (PRE) provides a promising cryptographic primitive enabling data owners to delegate decryption rights via a proxy, without revealing plaintext or requiring reencryption of data for each recipient. In this work, we propose a novel PREbased model for secure and confidential cloud data sharing. Our model integrates identity-based unidirectional proxy reencryption (IBPRE) with efficient user revocation and finegrained access control. Key contributions include: (1) a system design that allows the cloud provider (as semitrusted proxy) to transform ciphertexts encrypted under the owner’s key to ciphertexts decryptable by authorized users, without learning the underlying plaintext; (2) a revocation mechanism supporting immediate revocation of access rights; (3) optimization for efficiency via keyhomomorphic constrained pseudorandom functions (PRFs) and lightweight reencryption key generation; (4) security proofs under standard cryptographic assumptions (e.g. bilinear DiffieHellman, Learning With Errors where applicable), including confidentiality, unidirectionality, and resistance to collusion among users. We implement a prototype and benchmark performance on typical cloud data operations (file upload, share, revoke, decrypt). Our experiments show that reencryption adds only modest overhead (≈ 2030% in CPU and latency) compared to direct encryption + decryption, and revocation operations are efficient even with large numbers of users. The model also scales in terms of storage and network cost. Potential tradeoffs include nontrivial cost in proxy computation and key management complexity. Overall, the proposed PRE model offers a secure, practical, and flexible solution for confidential cloud data sharing, balancing performance, security, and usability. |
AUTHOR | Arundhati Roy Devi Don Bosco Institute of Technology, Mumbai, India |
PUBLICATION DATE | 2025-09-21 |
VOLUME | 12 |
DOI | DOI:10.15680/IJARETY.2025.1201038 |
38_A Proxy Re Encryption Model for Secure and Confidential Cloud Data Sharing.pdf | |
KEYWORDS |
Copyright © IJARETY 2023 All Rights Reserved.