A Novel and Efficient Secure Scheme for Cloud Storage Data with Key Vulnerability
Main Article Content
Abstract
Cloud storage in public systems has become a major issue to control data access. A
pliable and most secure way to secure the data in the cloud severs for cloud storage is by
using Ciphertext-Policy Attribute-Based Encryption (CP-ABE). But, in existing scheme
the secure key distribution and verification is done by a single attribute authority which
take a lot of time. When it is done by the single attribute authority, it is like a single-point
play acquired in a big cloud storage system. There will be users who will be waiting for
secret keys for a long-time which result in the less efficiency of the system. Many solutions
have been proposed like multi authority scheme to overcome this problem but was unable
to overcome this problem. Therefore, this articleproposed a data confidentiality against
an adversary which knows the encryption key and has access to a large fraction of the
ciphertext blocks. To this end, we propose Bastion, a novel and efficient scheme that
guarantees data confidentiality even if the encryption key is leaked and the adversary has
access to almost all ciphertext blocks. We analyze the security of Bastion, and we
evaluate its performance by means of a prototype implementation. We also discuss
practical insights with respect to the integration of Bastion in commercial dispersed
storage systems. Our evaluation results suggest that Bastion is well-suited for integration
in existing systems since it incurs less than 5% overhead compared to existing
semantically secure encryption modes.
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.