DOI QR코드

DOI QR Code

Key Generation and Management Scheme for Partial Encryption Based on Hash Tree Chain

부분 암호화를 위한 해쉬 트리 체인 기반 키 생성 및 관리 알고리즘

  • Received : 2016.06.10
  • Accepted : 2016.07.21
  • Published : 2016.09.30

Abstract

A new key generation scheme is proposed to support partial encryption and partial decryption of data in cloud computing environment with a minimal key-related traffic overhead. Our proposed scheme employs a concept of hash tree chain to reduce the number of keys that need to be delivered to the decryption node. The performance of the proposed scheme is evaluated through simulation.

본 논문에서는 부분 암호화를 위한 키 생성 및 관리 알고리즘의 연구한다. 제안하는 알고리즘에서는 해쉬 트리 구조를 이용하여 적은 양의 해쉬키로부터 다양한 암호화 키를 생성하는 기능을 제공하고 있다. 본 논문에서는 새로운 키 생성 알고리즘을 이용하여 부분 암호화 및 부분 복호화하는 방법을 제시하고 시뮬레이션을 통하여 그 성능을 분석한다.

Keywords

References

  1. Boneh. D., G.D. Crescenzo, R. Ostrovsky, "Public key encryption with keyword search", Adcances in Cryptology - EUROCRYPT, Interlaken, Switzerland, 2004, 506-522.
  2. Boneh, D., B. Waters, "Conjunctive, subset, and range queries on encrypted data", Theory of Cryptography. Amsterdam, Netherlands. 2007, 535-554.
  3. Droogenbroeck. M.V., R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images", Advanced Concepts for Intelligent Vision Systems, Ghent, Belgium, 2002, 90-97.
  4. Droogenbroeck. M.V., "Partial encryption of images for real-time applications", Fourth IEEE Benelux Signal Processing, Belgium, 2004, 11-15.
  5. Kim, H.Y., "MS, BPOS 클라우드 데이터 유출", 2010, http://www.zdnet.co.kr/news/news_view.asp?artice_id=20101224105449 (Accessed June 09).
  6. Kim, K.M., S.Y. Nam, "Partial encryption algorithm based on block cipher algorithm", Proceedings of the 33th KSII Spring Conference, Kyoungsan, Korea, 2016, 119-120
  7. Kuranda, S., "The 10 Biggest Data Breaches of 2015", 2015, http://www.crn.com/slide-shows/security/300077563/the-10-biggest-data-breaches-of-2015-so-far.htm (Accessed June 09).
  8. Lee, D.Y., "2013년 최악의 데이터 유출 사고", 2014, www.itworld.co.kr/slideshow/86276 (Accessed June 09).
  9. Pandurange, H.T., S.K. Kumar, "Advanced partial image encryption using two-stage hill cipher technique" International Journal of Computer Application, Vol.60, No.16, 2012, 14-19. https://doi.org/10.5120/9775-4341
  10. Shi, E., H. Bethencourt, T.H. Chan, D. Song, A. Perrig, "Multi-dimensional range query over encrypted data", 2007 IEEE Symposium on Security and Privacy, Berkeley, USA, 2007, 350-364.
  11. Song, D., D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data", Security and Privacy, Berkeley, USA, 2000, 44-55.
  12. Takabi, H., J.B.D. Joshi, G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE SECURITY & PRIVACY, Vol.8 No.6, 2010, 24-31. https://doi.org/10.1109/MSP.2010.186