Security sharing scheme for encrypted data in cloud storage
academic paper|更新时间:2024-06-05
|
Security sharing scheme for encrypted data in cloud storage
Journal on CommunicationsVol. 36, Issue 10, Pages: 1-8(2015)
作者机构:
北京邮电大学 智能通信软件与多媒体北京市重点实验室,北京 100876
作者简介:
基金信息:
The National Natural Science Foundation of China(61370069);The National High Technology Research and Development Program of China(863 Program)(2012AA012600)
Wen-bin YAO, Si HAN, Xiao-yong LI. Security sharing scheme for encrypted data in cloud storage[J]. Journal on Communications, 2015, 36(10): 1-8.
DOI:
Wen-bin YAO, Si HAN, Xiao-yong LI. Security sharing scheme for encrypted data in cloud storage[J]. Journal on Communications, 2015, 36(10): 1-8. DOI: 10.11959/j.issn.1000-436x.2015211.
Security sharing scheme for encrypted data in cloud storage
With the convenient of storing and sharing data in cloud storage environment
the concerns about data security arised as well.To achieve data security on untrusted servers
user usually stored the encrypted data on the cloud storage environment.How to build a cipertext-based access control scheme became a pot issue.For the access control problems of ciphertext in cloud storage environment
a CP-ABE based data sharing scheme was proposed.Novel key generation and distribution strategies were proposed to reduce the reliance on a trusted third party.Personal information was added in decryption key to resistant conclusion attacks at the same time.Moreover
key revocation scheme was proposed to provide the data backward secrecy.The security and implement analysis proves that proposed scheme is suit for the real application environment.
关键词
Keywords
references
MELL P , GRANCE T . The NIST Definition of Cloud Computing [R ] . National Institute of Standards and Technology,Tech Rep , 2009 .
GOYAL V , PANDY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [A ] . Proceedings of the 13th ACM Conference on Computer and Communications Security(CCS) [C ] . ACM , 2006 . 89 - 98 .
YU S , WANG C , REN K , et al . Achieving secure,scalable,and fine grained data access control in cloud computing [A ] . International Conference on Computer Communications(INFOCOM) [C ] . 2010 . 1 - 9 .
SUN G Z , DONG Y , LI Y . CP-ABE based data access control for cloud storage [J ] . Journal on Communications , 2011 , 32 ( 7 ): 146 - 152 .
ZHOU Z B , HUANG D J , WANG Z J . Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption [J ] . IEEE Transactions on Computers , 2015 , 64 ( 1 ): 126 - 138 .
DONG X , YU J , LUO Y , et al . Achieving an effective,scalable and privacy-preserving data sharing service in cloud computing [J ] . Computers & Security , 2014 , 42 : 151 - 164 .
YANG K , JIA X . DAC-MACS:effective data access control for multi-authority cloud storage systems [J ] . Security for Cloud Storage Systems , 2014 : 59 - 83 .
SUBRAMANIAN J V , PANDIAN A , KUMAR M . Improving security and efficiency in attribute-based data sharing [J ] . Networking and Communication Engineering , 2012 , 4 ( 2 ): 76 - 83 .
JUNG T , LI X Y , WAN Z , et al . Privacy preserving cloud data access with multi-authorities [A ] . INFOCOM,2013 Proceedings IEEE [C ] . 2013 . 2625 - 2633 .
WAN Z , LIU J , DENG R H . HASBE:a hierarchical attribute-based solution for flexible and scalable access control in cloud computing [J ] . Information Forensics and Security,IEEE Transactions , 2012 , 7 ( 2 ): 743 - 754 .
SUBRAMANIAN J V , PANDIAN A , KUMAR M . Improving security and efficiency in attribute-based data sharing [J ] . Networking and Communication Engineering , 2012 , 4 ( 2 ): 76 - 83 .
YANG K , JIA X . DAC-MACS:effective data access control for multi-authority cloud storage systems [J ] . IEEE Transactions on Information Forensics & Security , 2013 , 8 ( 11 ): 1790 - 1801 .
WAN Z , LIU J , ZHANG R , et al . A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting [J ] . Multimedia,IEEE Transactions , 2013 , 15 ( 6 ): 1353 - 1364 .
SU J S , CAO D , WANG X F , et al . Auribate-based encryption schemes [J ] . Journal of Software , 2011 , 22 ( 6 ): 1299 - 1315 .
BELLARE M , DESAI A , POINTCHEVAL D . Relations among notions of security for public-key encryption schemes [J ] . Lecture Notes in Computer Science , 1998 , 1462 : 22 - 45 .
DOSHI N , JINWALA D C . Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption [J ] . Security and Communication Networks , 2014 , 7 ( 11 ): 1988 - 2002 .