• Wednesday, Oct 1st, 2025

International Journal of Advanced Research in Education and TechnologY(IJARETY)
International, Double Blind-Peer Reviewed & Refereed Journal, Open Access Journal
|Approved by NSL & NISCAIR |Impact Factor: 8.152 | ESTD: 2014|

|Scholarly Open Access Journals, Peer-Reviewed, and Refereed Journal, Impact Factor-8.152 (Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool), Multidisciplinary, Bi-Monthly, Citation Generator, Digital Object Identifier(DOI)|

Article

TITLE A Proxy Re Encryption Model for Secure and Confidential Cloud Data Sharing
ABSTRACT Cloud storage and cloud sharing services have become ubiquitous, but they also raise concerns about data confidentiality when data owners delegate access. Proxy ReEncryption (PRE) provides a promising cryptographic primitive enabling data owners to delegate decryption rights via a proxy, without revealing plaintext or requiring reencryption of data for each recipient. In this work, we propose a novel PREbased model for secure and confidential cloud data sharing. Our model integrates identity-based unidirectional proxy reencryption (IBPRE) with efficient user revocation and finegrained access control. Key contributions include: (1) a system design that allows the cloud provider (as semitrusted proxy) to transform ciphertexts encrypted under the owner’s key to ciphertexts decryptable by authorized users, without learning the underlying plaintext; (2) a revocation mechanism supporting immediate revocation of access rights; (3) optimization for efficiency via keyhomomorphic constrained pseudorandom functions (PRFs) and lightweight reencryption key generation; (4) security proofs under standard cryptographic assumptions (e.g. bilinear DiffieHellman, Learning With Errors where applicable), including confidentiality, unidirectionality, and resistance to collusion among users. We implement a prototype and benchmark performance on typical cloud data operations (file upload, share, revoke, decrypt). Our experiments show that reencryption adds only modest overhead (≈ 2030% in CPU and latency) compared to direct encryption + decryption, and revocation operations are efficient even with large numbers of users. The model also scales in terms of storage and network cost. Potential tradeoffs include nontrivial cost in proxy computation and key management complexity. Overall, the proposed PRE model offers a secure, practical, and flexible solution for confidential cloud data sharing, balancing performance, security, and usability.
AUTHOR Arundhati Roy Devi Don Bosco Institute of Technology, Mumbai, India
PUBLICATION DATE 2025-09-21
VOLUME 12
DOI DOI:10.15680/IJARETY.2025.1201038
PDF 38_A Proxy Re Encryption Model for Secure and Confidential Cloud Data Sharing.pdf
KEYWORDS