SECURE DATA GROUP SHARING AND CONDITIONAL DISSEMINATION WITH MULTI-OWNER IN CLOUD COMPUTING

Main Article Content

Vidhya Shenigaram
Susheel Kumar Thakur
Choul Praveen Kumar
Laxman Maddikunta

Abstract

With the rapid development of cloud services, huge volume of data is shared via cloud computing. Although cryptographic techniques have been utilized to provide data confidentiality in cloud computing, current mechanisms cannot enforce privacy concerns over cipher text associated with multiple owners, which makes co-owners unable to appropriately control whether data disseminators can actually disseminate their data. In this paper, we propose a secure data group sharing and conditional dissemination scheme with multi-owner in cloud computing, in which data owner can share private data with a group of users via the cloud in a secure way, and data disseminator can disseminate the data to a new group of users if the attributes satisfy the access policies in the cipher text. We further present a multiparty access control mechanism over the disseminated cipher text, in which the data co-owners can append new access policies to the cipher text due to their privacy preferences. Moreover, three policy aggregation strategies, including full permit, owner priority and majority permit, are provided to solve the privacy conflicts problem caused by different access policies. The security analysis and experimental results show our scheme is practical and efficient for secure data sharing with multi-owner in cloud computing.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Shenigaram, V. ., Thakur, S. K., Kumar, C. P. ., & Maddikunta, L. . (2018). SECURE DATA GROUP SHARING AND CONDITIONAL DISSEMINATION WITH MULTI-OWNER IN CLOUD COMPUTING. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 9(3), 1312–1318. https://doi.org/10.61841/turcomat.v9i3.14475
Section
Articles

References

Z. Yan, X. Li, M. Wang, and A. V.

Vasilakos, “Flexible data access control

based on trust and reputation in cloud

computing,” IEEE Transactions on Cloud

Computing, vol. 5, no. 3, pp. 485-498, 2017.

B. Lang, J. Wang, and Y. Liu,

“Achieving flexible and self-contained data

protection in cloud computing,” IEEE

Access, vol. 5, pp. 1510- 1523, 2017.

Q. Zhang, L. T. Yang, and Z. Chen,

“Privacy preserving deep computation

model on cloud for big data feature

learning,” IEEE Transactions on Computers,

vol. 65, no. 5, pp. 1351-1362, 2016.

H. Cui, X. Yi, and S. Nepal, “Achieving

scalable access control over encrypted data

for edge computing networks,” IEEE

Access, vol. 6, pp. 30049–30059, 2018.

K. Xue, W. Chen, W. Li, J. Hong, and P.

Hong, “Combining data owner-side and

cloud-side access control for encrypted

cloud storage,” IEEE Transactions on

Information Forensics and Security, vol. 13,

no. 8, pp. 2062–2074, 2018.

C. Delerablée, “Identity-based broadcast

encryption with constant size ciphertexts

and private keys,” Proc. International Conf.

on the Theory and Application of Cryptology

and Information Security

(ASIACRYPT‘2007), pp. 200-215, 2007.

N. Paladi, C. Gehrmann, and A.

Michalas, “Providing user security

guarantees in public infrastructure clouds,”

IEEE Transactions on Cloud Computing,

vol. 5, no. 3, pp. 405-419, 2017.

J. Bethencourt, A. Sahai, and B. Waters,

“Ciphertext-policy attribute based

encryption,” Proc. IEEE Symposium on

Security and Privacy (SP‘07), pp. 321-334,

L. Liu, Y. Zhang, and X. Li, “KeyD:

secure key-deduplication with identity-based

broadcast encryption,” IEEE Transactions

on Cloud Computing, 2018,

https://ieeexplore.ieee.org/document/845813

Q. Huang, Y. Yang, and J. Fu, “Secure

data group sharing and dissemination with

attribute and time conditions in Public

Clouds,” IEEE Transactions on Services

Computing, 2018,

https://ieeexplore.ieee.org/document/839539

Box, “Understanding collaborator

permission levels”, https://community.

box.com/t5/Collaborate-By-InvitingOthers/Understanding-CollaboratorPermission-Levels/ta-p/144.

Microsoft OneDrive, “Document

collaboration and co-authoring”,

https://support.office.com/enus/article/document-collaborationand-coauthoring-ee1509b4-1f6e-401e-b04a-

d26f564a4.

H. He, R. Li, X. Dong, and Z. Zhang,

“Secure, efficient and finegrained data

access control mechanism for P2P storage

cloud,” IEEE Transactions on Cloud

Computing, vol. 2, no. 4, pp. 471-484, 2014.

Z. Qin, H. Xiong, S. Wu, and J.

Batamuliza, “A survey of proxy

reencryption for secure data sharing in cloud

computing,” IEEE Transactions on Services

Computing, 2018,

https://ieeexplore.ieee.org/document/744844

J. Son, D. Kim, R. Hussain, and H. Oh,

“Conditional proxy reencryption for secure

big data group sharing in cloud

environment,” Proc. of 2014 IEEE

Conference on Computer Communications

Workshops (INFOCOM WKSHPS), pp. 541–

, 2014.

L. Jiang, and D. Guo “Dynamic

encrypted data sharing scheme based on

conditional proxy broadcast re-encryption

for cloud storage,” IEEE Access, vol. 5, pp.

– 13345, 2017.

Most read articles by the same author(s)