A proxy re-encryption-based webmail and file sharing system for collaboration in cloud computing environment

Most email users are still using the same email address set up fifteen years ago. Attained from their Internet service provider or having a free email account provided by Yahoo, Gmail or their college. The difference between most people is, secure and unsafe email can be found to be innocent. After all, we have nothing to hide, no illegal activities or anything dangerous. Google, Yahoo, and other webmail service providers use SSL/TLS or alternative methods to encrypt email communications in transit. S/MIME offers encryption, validation, message reliability and non-repudiation. We propose a novel proxy-re-encryption based webmail and file sharing system (PREWM). The PREWM server framework for a provable secure way for users to register the sharing of messages and content with a third-party cloud-based webmail system. In such a way, an intended receiver that neither has a cloud-based webmail provider or a proxy web server will be able to see the contents stored in the Webmail server. We make use of a cryptographic primitive called proxy re-encryption (PRE) to realize end-to-end privacy while sharing the contents of collaborative development. Also, we present the initial architecture and implementation in an Internet setting. We present the system architecture and its implementation. This paper will serve as a prototype for building next-generation webmail that can be adapted to any operating system.

[1]  Markus Jakobsson,et al.  On Quorum Controlled Asymmetric Proxy Re-encryption , 1999, Public Key Cryptography.

[2]  Abdul Ghafoor,et al.  CryptoNET: Design and implementation of the Secure Email System , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.

[3]  Alexander L. Wijesinha,et al.  A bare PC TLS Webmail Server , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[4]  Anil Rawat,et al.  Implementation and Security Analysis of a CallerId Augmented 2FA Setup for Secure Web-mail Access , 2010 .

[5]  Robert H. Deng,et al.  Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.

[6]  Yevgeniy Dodis,et al.  Proxy cryptography revisted , 2003 .

[7]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[8]  Robert H. Deng,et al.  CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles , 2010, Science China Information Sciences.

[9]  S. Sree Vivek,et al.  Secure Cloud Storage and File Sharing , 2017, 2017 IEEE International Conference on Smart Cloud (SmartCloud).

[10]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[11]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.

[12]  Matthew Green,et al.  Identity-Based Proxy Re-encryption , 2007, ACNS.

[13]  Yevgeniy Dodis,et al.  Proxy Cryptography Revisited , 2003, NDSS.

[14]  Jie Wu,et al.  Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.

[15]  C. Pandu Rangan,et al.  Conditional Proxy Re-Encryption - A More Efficient Construction , 2011 .

[16]  C. C. Sobin,et al.  A special purpose proxy re-signature scheme , 2012, 2012 International Conference on Innovations in Information Technology (IIT).

[17]  Duminda Wijesekera,et al.  BPEL orchestration of secure webmail , 2006, SWS '06.

[18]  Bharat S. Rawal Proxy re-encryption architect for storing and sharing of cloud contents , 2020, Int. J. Parallel Emergent Distributed Syst..

[19]  M. Mambo,et al.  Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .