Open Access iconOpen Access

ARTICLE

crossmark

Mode of Operation for Modification, Insertion, and Deletion of Encrypted Data

by Taek-Young Youn1, Nam-Su Jho2,*

1 Dankook University, Yongin, Gyeonggi, 16890, Korea
2 Electronics and Telecommunications Research Institute, Daejeon, 34129, Korea

* Corresponding Author: Nam-Su Jho. Email: email

Computers, Materials & Continua 2022, 73(1), 151-164. https://doi.org/10.32604/cmc.2022.026653

Abstract

Due to the development of 5G communication, many aspects of information technology (IT) services are changing. With the development of communication technologies such as 5G, it has become possible to provide IT services that were difficult to provide in the past. One of the services made possible through this change is cloud-based collaboration. In order to support secure collaboration over cloud, encryption technology to securely manage dynamic data is essential. However, since the existing encryption technology is not suitable for encryption of dynamic data, a new technology that can provide encryption for dynamic data is required for secure cloud-based collaboration. In this paper, we propose a new encryption technology to support secure collaboration for dynamic data in the cloud. Specifically, we propose an encryption operation mode which can support data updates such as modification, addition, and deletion of encrypted data in an encrypted state. To support the dynamic update of encrypted data, we invent a new mode of operation technique named linked-block cipher (LBC). Basic idea of our work is to use an updatable random value so-called link to link two encrypted blocks. Due to the use of updatable random link values, we can modify, insert, and delete an encrypted data without decrypt it.


Keywords


Cite This Article

APA Style
Youn, T., Jho, N. (2022). Mode of operation for modification, insertion, and deletion of encrypted data. Computers, Materials & Continua, 73(1), 151-164. https://doi.org/10.32604/cmc.2022.026653
Vancouver Style
Youn T, Jho N. Mode of operation for modification, insertion, and deletion of encrypted data. Comput Mater Contin. 2022;73(1):151-164 https://doi.org/10.32604/cmc.2022.026653
IEEE Style
T. Youn and N. Jho, “Mode of Operation for Modification, Insertion, and Deletion of Encrypted Data,” Comput. Mater. Contin., vol. 73, no. 1, pp. 151-164, 2022. https://doi.org/10.32604/cmc.2022.026653



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1192

    View

  • 846

    Download

  • 0

    Like

Share Link