SECURE DATA GROUP SHARING AND CONDITIONAL DISSEMINATION WITH MULTI-OWNER IN CLOUD COMPUTING
Main Article Content
Abstract
With the rapid development of cloud services, huge volume of data is shared via cloud computing. Although cryptographic techniques have been utilized to provide data confidentiality in cloud computing, current mechanisms cannot enforce privacy concerns over cipher text associated with multiple owners, which makes co-owners unable to appropriately control whether data disseminators can actually disseminate their data. In this paper, we propose a secure data group sharing and conditional dissemination scheme with multi-owner in cloud computing, in which data owner can share private data with a group of users via the cloud in a secure way, and data disseminator can disseminate the data to a new group of users if the attributes satisfy the access policies in the cipher text. We further present a multiparty access control mechanism over the disseminated cipher text, in which the data co-owners can append new access policies to the cipher text due to their privacy preferences. Moreover, three policy aggregation strategies, including full permit, owner priority and majority permit, are provided to solve the privacy conflicts problem caused by different access policies. The security analysis and experimental results show our scheme is practical and efficient for secure data sharing with multi-owner in cloud computing.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
Z. Yan, X. Li, M. Wang, and A. V.
Vasilakos, “Flexible data access control
based on trust and reputation in cloud
computing,” IEEE Transactions on Cloud
Computing, vol. 5, no. 3, pp. 485-498, 2017.
B. Lang, J. Wang, and Y. Liu,
“Achieving flexible and self-contained data
protection in cloud computing,” IEEE
Access, vol. 5, pp. 1510- 1523, 2017.
Q. Zhang, L. T. Yang, and Z. Chen,
“Privacy preserving deep computation
model on cloud for big data feature
learning,” IEEE Transactions on Computers,
vol. 65, no. 5, pp. 1351-1362, 2016.
H. Cui, X. Yi, and S. Nepal, “Achieving
scalable access control over encrypted data
for edge computing networks,” IEEE
Access, vol. 6, pp. 30049–30059, 2018.
K. Xue, W. Chen, W. Li, J. Hong, and P.
Hong, “Combining data owner-side and
cloud-side access control for encrypted
cloud storage,” IEEE Transactions on
Information Forensics and Security, vol. 13,
no. 8, pp. 2062–2074, 2018.
C. Delerablée, “Identity-based broadcast
encryption with constant size ciphertexts
and private keys,” Proc. International Conf.
on the Theory and Application of Cryptology
and Information Security
(ASIACRYPT‘2007), pp. 200-215, 2007.
N. Paladi, C. Gehrmann, and A.
Michalas, “Providing user security
guarantees in public infrastructure clouds,”
IEEE Transactions on Cloud Computing,
vol. 5, no. 3, pp. 405-419, 2017.
J. Bethencourt, A. Sahai, and B. Waters,
“Ciphertext-policy attribute based
encryption,” Proc. IEEE Symposium on
Security and Privacy (SP‘07), pp. 321-334,
L. Liu, Y. Zhang, and X. Li, “KeyD:
secure key-deduplication with identity-based
broadcast encryption,” IEEE Transactions
on Cloud Computing, 2018,
https://ieeexplore.ieee.org/document/845813
Q. Huang, Y. Yang, and J. Fu, “Secure
data group sharing and dissemination with
attribute and time conditions in Public
Clouds,” IEEE Transactions on Services
Computing, 2018,
https://ieeexplore.ieee.org/document/839539
Box, “Understanding collaborator
permission levels”, https://community.
box.com/t5/Collaborate-By-InvitingOthers/Understanding-CollaboratorPermission-Levels/ta-p/144.
Microsoft OneDrive, “Document
collaboration and co-authoring”,
d26f564a4.
H. He, R. Li, X. Dong, and Z. Zhang,
“Secure, efficient and finegrained data
access control mechanism for P2P storage
cloud,” IEEE Transactions on Cloud
Computing, vol. 2, no. 4, pp. 471-484, 2014.
Z. Qin, H. Xiong, S. Wu, and J.
Batamuliza, “A survey of proxy
reencryption for secure data sharing in cloud
computing,” IEEE Transactions on Services
Computing, 2018,
https://ieeexplore.ieee.org/document/744844
J. Son, D. Kim, R. Hussain, and H. Oh,
“Conditional proxy reencryption for secure
big data group sharing in cloud
environment,” Proc. of 2014 IEEE
Conference on Computer Communications
Workshops (INFOCOM WKSHPS), pp. 541–
, 2014.
L. Jiang, and D. Guo “Dynamic
encrypted data sharing scheme based on
conditional proxy broadcast re-encryption
for cloud storage,” IEEE Access, vol. 5, pp.
– 13345, 2017.