International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 164 - Number 5 |
Year of Publication: 2017 |
Authors: Raghi Roy, Paul P. Mathai |
10.5120/ijca2017913642 |
Raghi Roy, Paul P. Mathai . Proxy Re-encryption Schemes for Secure Cloud Data and Applications: A Survey. International Journal of Computer Applications. 164, 5 ( Apr 2017), 1-6. DOI=10.5120/ijca2017913642
This paper presents a survey on Proxy re-encryption techniques with respect to secure cloud data and its application. To keep sensitive user data confidential against untrusted servers, cryptographic methods are used to provide security and access control in clouds. As the data is shared over the network, it is needed to be encrypted. There are many encryption schemes that provide security and access control over the network.Proxy re-encryption enables the semi-trusted proxy server to re-encrypt the ciphertext encrypted under Alice’s public key to another ciphertext encrypted under Bob’s public key. The re-encryption is done without the server being able to decrypt the ciphertext.Cloud services and applications should follow the standard security measures including data confidentiality, integrity,privacy, robustness and access control.In this paper the proxy re-encryption(PRE) schemes, Conditional PRE,Identity based PRE and Broadcast PRE,Type based PRE, Key private PRE,Attribute based PRE,Threshold PRE and its role in securing the cloud data are explained.