DOI QR코드

DOI QR Code

Method of Changing Password for Secure Cloud Storage based on Proxy Re-encryption Scheme

프록시 재암호화 기반의 보안 클라우드 저장장치를 위한 분실된 비밀번호 변경 기법

  • Received : 2015.11.23
  • Accepted : 2016.03.08
  • Published : 2016.03.25

Abstract

In cloud storages, as security of stored files and privacy of users become regarded as important concerns, secure cloud storages have been proposed, where stored files are encrypted with file owner's password and even the cloud service provider can not open the file contents. However, if the file owner forgets one's password, one can no longer access the file. To solve this problem, we propose a scheme for changing password for the secure cloud based on proxy re-encryption, which make the file owner enable to change password even when one forgets it. With the proposed scheme, only the file owner can change the password and re-encrypt the files securely because other user and even the service provider can not see the file contents.

클라우드에서 저장된 데이터의 보안 및 사용자의 프라이버시가 중요해짐에 따라 암호화하여 파일을 저장하되 사용자만 복호화할 수 있고, 클라우드 서비스 제공업체 조차도 암호화된 파일을 열어볼 수 없는 보안 클라우드가 개발되었다. 하지만, 이러한 제약 때문에 사용자가 비밀번호를 분실하면 저장된 데이터를 아무도 열어보지 못 하는 부작용이 발생하게 된다. 본 논문에서는 상기 문제점을 해결하기 위하여 프록시 재암호화 기법을 이용하여 보안 클라우드에서 사용자가 비밀번호를 분실하더라도 비밀번호를 갱신할 수 있는 기법을 제안하고자 한다. 본 기술을 사용하면 제 3자 및 클라우드 서비스 제공업체 조차도 파일 내용을 볼 수 없기 때문에 오로지 파일 소유자만이 안전하게 비밀번호를 업데이트 하고 암호화된 파일을 재암호화 할 수 있다.

Keywords

References

  1. Fei Chen, Tao Xiang, Yuanyuan Yang, and Chow S.S.M., "Secure cloud storage meets with secure network coding," in INFOCOM, 2014 Proceedings IEEE, vol., no., pp.673-681, April 27 2014-May 2 2014
  2. Cong Wang, Chow, S.S.M., Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," in Computers, IEEE Transactions on , vol.62, no.2, pp.362-375, Feb. 2013 https://doi.org/10.1109/TC.2011.245
  3. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. "Provable data possession at untrusted stores," in Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 598-609.
  4. https://spideroak.com/
  5. https://www.boxcryptor.com/
  6. D. Boneh, and M. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., 32(3):586-615, Mar 2003. https://doi.org/10.1137/S0097539701398521
  7. X. Lin, X. Sun, P. Ho, and X. Shen. "GSIS: A secure and privacy-preserving protocol for vehicular communications," Vehicular Technology, IEEE Transactions on, 56(6):3442-3456, Nov. 2007. https://doi.org/10.1109/TVT.2007.906878
  8. Young-Hoon Park, and Seung-Woo Seo, "Scheme for Verification Between Mobile Devices in a Service with Expiration Time by Using Zeroknowledge Proof", in Journal of the Institute of Electronics Engineers of Korea Vol. 50 No.3, pp. 23-32, Mar. 2013
  9. Y. Kawahara, T. Takagi, and E. Okamoto. "Efficient Implementation of Tate Pairing on a Mobile Phone Using Java," In Computational Intelligence and Security, Lecture Notes In Artificial Intelligence, Vol. 4456. Springer-Verlag, Berlin, Heidelberg 396-405.
  10. S. D. Galbraith, K. Harrison, and D. Soldera. 2002. "Implementing the Tate Pairing," In Proceedings of the 5th International Symposium on Algorithmic Number Theory (ANTS-V), Claus Fieker and David R. Kohel (Eds.). Springer-Verlag, London, UK, UK, 324-337.
  11. WooKwon Koo, JungYeon Hwang, Hyoung-Joong Kim, and DongHoon Lee, "ID-Based Proxy Reencryption Scheme with Chosen-CiphertextSecurity", in Journal of the Institute of Electronics Engineers of Korea Vol. 46 No. 3, pp. 64-77, Jan. 2009
  12. Anca-Andreea Ivan and Yevgeniy Dodis. Proxy Cryptography Revisited. In NDSS. The Internet Society, 2003.
  13. Ran Canetti and Susan Hohenberger. 2007. Chosen-ciphertext secure proxy re-encryption. In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 185-194.