CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND
REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD
ABSTRACT:
More and more clients would like to store their data to PCS (public cloud
servers) along with the rapid development of cloud computing. New security
problems have to be solved in order to help more clients process their data in
public cloud. When the client is restricted to access PCS, he will delegate its
proxy to process his data and upload them. On the other hand, remote data
integrity checking is also an important security problem in public cloud storage.
It makes the clients check whether their outsourced data is kept intact without
downloading the whole data. From the security problems, we propose a novel
proxy-oriented data uploading and remote data integrity checking model in
identity-based public key cryptography: IDPUIC (identity-based proxy-oriented
data uploading and remote data integrity checking in public cloud). We give the
formal definition, system model and security model. Then, a concrete ID-PUIC
protocol is designed by using the bilinear pairings. The proposed ID-PUIC
protocol is provably secure based on the hardness of CDH (computational
Diffie-Hellman) problem. Our ID-PUIC protocol is also efficient and flexible.
Based on the original client’s authorization, the proposed ID-PUIC protocol can
realize private remote data integrity checking, delegated remote data integrity
checking and public remote data integrity checking.
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
CONCLUSION
Motivated by the application needs, this paper proposes the novel security
concept of ID-PUIC in public cloud. The paper formalizes ID-PUIC’s system
model and security model. Then, the first concrete ID-PUIC protocol is
designed by using the bilinear pairings technique. The concrete ID-PUIC
protocol is provably secure and efficient by using the formal security proof and
efficiency analysis. On the other hand, the proposed ID-PUIC protocol can also
realize private remote data integrity checking, delegated remote data integrity
checking and public remote data integrity checking based on the original
client’s authorization.
REFERENCES
[1] Z. Fu, X. Sun, Q. Liu, L. Zhou, J. Shu, “Achieving efficient cloud search
services: multi-keyword ranked search over encrypted cloud data supporting
parallel computing,” IEICE Transactions on Communications, vol. E98-B, no.
1, pp.190-200, 2015.
[2] Y. Ren, J. Shen, J. Wang, J. Han, S. Lee, “Mutual verifiable provable data
auditing in public cloud storage,” Journal of Internet Technology, vol. 16, no. 2,
pp. 317-323, 2015.
[3] M. Mambo, K. Usuda, E. Okamoto, “Proxy signature for delegating signing
operation”, CCS 1996, pp. 48C57, 1996.
[4] E. Yoon, Y. Choi, C. Kim, “New ID-based proxy signature scheme with
message recovery”, Grid and Pervasive Computing, LNCS 7861, pp. 945-951,
2013.
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
[5] B. Chen, H. Yeh, “Secure proxy signature schemes from the weil pairing”,
Journal of Supercomputing, vol. 65, no. 2, pp. 496-506, 2013.
[6] X. Liu, J. Ma, J. Xiong, T. Zhang, Q. Li, “Personal health records integrity
verification using attribute based proxy signature in cloud computing”, Internet
and Distributed Computing Systems, LNCS 8223, pp. 238-251, 2013.
[7] H. Guo, Z. Zhang, J. Zhang, “Proxy re-encryption with unforgeable
reencryption keys”, Cryptology and Network Security, LNCS 8813, pp. 20-33,
2014.
[8] E. Kirshanova, “Proxy re-encryption from lattices”, PKC 2014, LNCS 8383,
pp. 77-94, 2014.
[9] P. Xu, H. Chen, D. Zou, H. Jin, “Fine-grained and heterogeneous proxy re-
encryption for secure cloud storage”, Chinese Science Bulletin, vol.59, no.32,
pp. 4201-4209, 2014.
[10] S. Ohata, Y. Kawai, T. Matsuda, G. Hanaoka, K. Matsuura, “Reencryption
verifiability: how to detect malicious activities of a proxy in proxy re-
encryption”, CT-RSA 2015, LNCS 9048, pp. 410-428, 2015

More Related Content

DOCX
Identity based proxy-oriented data uploading and remote data integrity checki...
PDF
Identity based proxy-oriented data uploading and remote data integrity checki...
PDF
Identity based encryption with outsourced revocation in cloud computing
DOC
documentation for identity based secure distrbuted data storage schemes
PPT
PPT FOR IDBSDDS SCHEMES
PDF
Identity based encryption with cloud revocation authority and its applications
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
DOCX
Cost effective authentic and anonymous data sharing with forward security
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based encryption with outsourced revocation in cloud computing
documentation for identity based secure distrbuted data storage schemes
PPT FOR IDBSDDS SCHEMES
Identity based encryption with cloud revocation authority and its applications
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Cost effective authentic and anonymous data sharing with forward security

What's hot (19)

DOC
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
PDF
Cost effective authentic and anonymous data sharing with forward security
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
DOCX
4.authentication and key agreement based on anonymous identity for peer to-pe...
PDF
International Journal of Computational Engineering Research(IJCER)
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
PPTX
Authentication on Cloud using Attribute Based Encryption
PDF
sweeney_brendan-css527-20141118-research_proposal
DOCX
6.designing secure and efficient biometric based secure access mechanism for ...
PDF
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
DOCX
Identity based proxy-oriented data uploading and
PDF
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
PDF
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
PDF
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
DOCX
pay as you decrypt decryption outsourcing for functional encryption using blo...
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
5.[40 44]enhancing security in cloud computing
PDF
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Cost effective authentic and anonymous data sharing with forward security
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
4.authentication and key agreement based on anonymous identity for peer to-pe...
International Journal of Computational Engineering Research(IJCER)
Control cloud data access privilege and anonymity with fully anonymous attrib...
Authentication on Cloud using Attribute Based Encryption
sweeney_brendan-css527-20141118-research_proposal
6.designing secure and efficient biometric based secure access mechanism for ...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
Identity based proxy-oriented data uploading and
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
pay as you decrypt decryption outsourcing for functional encryption using blo...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
5.[40 44]enhancing security in cloud computing
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Ad

Viewers also liked (13)

PDF
Identity based proxy-oriented data uploading and remote data integrity checki...
PPTX
Presentación1mate 1
PPTX
Least Cost Influence in Multiplex Social Networks
PPT
Sample PPT
PDF
Identity based encryption with cloud revocation authority and its applications
DOCX
A Novel privacy preserving public auditing for shared data in cloud
PDF
An Overview of Identity Based Encryption
DOCX
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
DOCX
Identity based encryption with outsourced revocation in cloud computing
PPTX
Got ipads, android tablets and windows devices
PPTX
Introduction of Cloud computing
PPT
Big data ppt
PPTX
Big data ppt
Identity based proxy-oriented data uploading and remote data integrity checki...
Presentación1mate 1
Least Cost Influence in Multiplex Social Networks
Sample PPT
Identity based encryption with cloud revocation authority and its applications
A Novel privacy preserving public auditing for shared data in cloud
An Overview of Identity Based Encryption
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Identity based encryption with outsourced revocation in cloud computing
Got ipads, android tablets and windows devices
Introduction of Cloud computing
Big data ppt
Big data ppt
Ad

Similar to IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD (20)

PDF
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
PDF
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
PDF
Remote data integrity checking with a third party auditor in public cloud usi...
PDF
a novel approach for data uploading
PDF
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
PDF
R180203114117
PDF
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
PDF
Identity-Based Distributed Provable Data Possession in Multicloud Storage
DOC
Identity based distributed provable data possession in multi-cloud storage
PDF
IRJET- Redsc: Reliablity of Data Sharing in Cloud
PDF
Privacy preserving public auditing for data storage security in cloud comp
PDF
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
DOCX
Privacy preserving public auditing for secure cloud storage
PDF
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
PDF
Iaetsd storage privacy protection against data
DOCX
Privacy preserving public auditing for secure cloud storage
PDF
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
PDF
A cloud storage system for sharing data securely with privacy preservation an...
PDF
Privacy preserving public auditing for secure cloud storage
PDF
Homomorphic authentication with random masking technique ensuring privacy
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
Remote data integrity checking with a third party auditor in public cloud usi...
a novel approach for data uploading
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
R180203114117
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity based distributed provable data possession in multi-cloud storage
IRJET- Redsc: Reliablity of Data Sharing in Cloud
Privacy preserving public auditing for data storage security in cloud comp
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
Privacy preserving public auditing for secure cloud storage
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
Iaetsd storage privacy protection against data
Privacy preserving public auditing for secure cloud storage
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
A cloud storage system for sharing data securely with privacy preservation an...
Privacy preserving public auditing for secure cloud storage
Homomorphic authentication with random masking technique ensuring privacy

More from Nexgen Technology (20)

DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
DOCX
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
DOCX
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
DOCX
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
DOCX
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
DOCX
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
DOCX
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
DOCX
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
DOCX
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
DOCX
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...

Recently uploaded (20)

PDF
Bacterial Diversity and Evolution Bacterial Taxonomy Lecture (4)_.pdf
PDF
NGÂN HÀNG CÂU HỎI TÁCH CHỌN LỌC THEO CHUYÊN ĐỀ TỪ ĐỀ THI THỬ TN THPT 2025 TIẾ...
PDF
New_Round_Up_6_SB.pdf download for free, easy to learn
PDF
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
PPTX
FILIPINO 8 Q2 WEEK 1(DAY 1).power point presentation
PDF
17649-Learning By Doing_text-tailieu.pdf
PPTX
INTRODUCTION TO PHILOSOPHY FULL SEM - COMPLETE.pptxINTRODUCTION TO PHILOSOPHY...
PPTX
Environmental Sciences and Sustainability Chapter 2
PPTX
CHF refers to the condition wherein heart unable to pump a sufficient amount ...
PDF
Design and Evaluation of a Inonotus obliquus-AgNP-Maltodextrin Delivery Syste...
PDF
Developing speaking skill_learning_mater.pdf
PPTX
chapter-1-221011141445-58f8b864sdfghj.pptx
PDF
Insight into Romanian Wild-Grown Heracleum sphondylium: Development of a New ...
PDF
3-Elementary-Education-Prototype-Syllabi-Compendium.pdf
PPTX
Unit1_Kumod_deeplearning.pptx DEEP LEARNING
PPTX
Entrepreneurship Management and Finance - Module 1 - PPT
PPTX
macro complete discussion with given activities
PDF
[Medicalstudyzone.com] 1. AIIMS NOV EMBER 2015 SOLVED PAPER.pdf
PDF
BA-1ST(Education)-Education and Society.pdf
PDF
IS1343_2012...........................pdf
Bacterial Diversity and Evolution Bacterial Taxonomy Lecture (4)_.pdf
NGÂN HÀNG CÂU HỎI TÁCH CHỌN LỌC THEO CHUYÊN ĐỀ TỪ ĐỀ THI THỬ TN THPT 2025 TIẾ...
New_Round_Up_6_SB.pdf download for free, easy to learn
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
FILIPINO 8 Q2 WEEK 1(DAY 1).power point presentation
17649-Learning By Doing_text-tailieu.pdf
INTRODUCTION TO PHILOSOPHY FULL SEM - COMPLETE.pptxINTRODUCTION TO PHILOSOPHY...
Environmental Sciences and Sustainability Chapter 2
CHF refers to the condition wherein heart unable to pump a sufficient amount ...
Design and Evaluation of a Inonotus obliquus-AgNP-Maltodextrin Delivery Syste...
Developing speaking skill_learning_mater.pdf
chapter-1-221011141445-58f8b864sdfghj.pptx
Insight into Romanian Wild-Grown Heracleum sphondylium: Development of a New ...
3-Elementary-Education-Prototype-Syllabi-Compendium.pdf
Unit1_Kumod_deeplearning.pptx DEEP LEARNING
Entrepreneurship Management and Finance - Module 1 - PPT
macro complete discussion with given activities
[Medicalstudyzone.com] 1. AIIMS NOV EMBER 2015 SOLVED PAPER.pdf
BA-1ST(Education)-Education and Society.pdf
IS1343_2012...........................pdf

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD

  • 1. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT: More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and security model. Then, a concrete ID-PUIC protocol is designed by using the bilinear pairings. The proposed ID-PUIC protocol is provably secure based on the hardness of CDH (computational Diffie-Hellman) problem. Our ID-PUIC protocol is also efficient and flexible. Based on the original client’s authorization, the proposed ID-PUIC protocol can realize private remote data integrity checking, delegated remote data integrity checking and public remote data integrity checking.
  • 2. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com CONCLUSION Motivated by the application needs, this paper proposes the novel security concept of ID-PUIC in public cloud. The paper formalizes ID-PUIC’s system model and security model. Then, the first concrete ID-PUIC protocol is designed by using the bilinear pairings technique. The concrete ID-PUIC protocol is provably secure and efficient by using the formal security proof and efficiency analysis. On the other hand, the proposed ID-PUIC protocol can also realize private remote data integrity checking, delegated remote data integrity checking and public remote data integrity checking based on the original client’s authorization. REFERENCES [1] Z. Fu, X. Sun, Q. Liu, L. Zhou, J. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015. [2] Y. Ren, J. Shen, J. Wang, J. Han, S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, vol. 16, no. 2, pp. 317-323, 2015. [3] M. Mambo, K. Usuda, E. Okamoto, “Proxy signature for delegating signing operation”, CCS 1996, pp. 48C57, 1996. [4] E. Yoon, Y. Choi, C. Kim, “New ID-based proxy signature scheme with message recovery”, Grid and Pervasive Computing, LNCS 7861, pp. 945-951, 2013.
  • 3. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com [5] B. Chen, H. Yeh, “Secure proxy signature schemes from the weil pairing”, Journal of Supercomputing, vol. 65, no. 2, pp. 496-506, 2013. [6] X. Liu, J. Ma, J. Xiong, T. Zhang, Q. Li, “Personal health records integrity verification using attribute based proxy signature in cloud computing”, Internet and Distributed Computing Systems, LNCS 8223, pp. 238-251, 2013. [7] H. Guo, Z. Zhang, J. Zhang, “Proxy re-encryption with unforgeable reencryption keys”, Cryptology and Network Security, LNCS 8813, pp. 20-33, 2014. [8] E. Kirshanova, “Proxy re-encryption from lattices”, PKC 2014, LNCS 8383, pp. 77-94, 2014. [9] P. Xu, H. Chen, D. Zou, H. Jin, “Fine-grained and heterogeneous proxy re- encryption for secure cloud storage”, Chinese Science Bulletin, vol.59, no.32, pp. 4201-4209, 2014. [10] S. Ohata, Y. Kawai, T. Matsuda, G. Hanaoka, K. Matsuura, “Reencryption verifiability: how to detect malicious activities of a proxy in proxy re- encryption”, CT-RSA 2015, LNCS 9048, pp. 410-428, 2015