Back to Search
Start Over
Two Secure Anonymous Proxy-based Data Storages
- Source :
- SECRYPT, 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016, Lisbon, Portugal. pp.251--258, ⟨10.5220/0005962402510258⟩, BASE-Bielefeld Academic Search Engine
- Publication Year :
- 2016
- Publisher :
- SCITEPRESS - Science and Technology Publications, 2016.
-
Abstract
- Unidirectional proxy re-encryption (PRE) can be used to realize an efficient and secure shared storage. However, this type of storage does not yet protect its users' privacy: to retrieve some data a user must give his identity and his query to the proxy. We propose two secure data storage systems that allow authorized users to anonymously get access to the content of encrypted data on a storage. Each scheme corresponds to a certain economic model. In the first one, a user has to pay for each downloaded file, whereas in the second one, users pay each month a subscription to get an unlimited access to all their files.
- Subjects :
- 021110 strategic, defence & security studies
business.industry
Computer science
standard model
Reverse proxy
0211 other engineering and technologies
proxy
02 engineering and technology
Computer security
computer.software_genre
Encryption
public key cryptography
Public-key cryptography
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Anonymous storage
Computer data storage
0202 electrical engineering, electronic engineering, information engineering
020201 artificial intelligence & image processing
Economic model
Proxy (statistics)
business
computer
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- Proceedings of the 13th International Joint Conference on e-Business and Telecommunications
- Accession number :
- edsair.doi.dedup.....472a1e2a8d5ca22046a43ef7e701903a
- Full Text :
- https://doi.org/10.5220/0005962402510258