SECURE DATA GROUP SHARING AND CONDITIONAL DISSEMINATION WITH MULTIOWNER IN CLOUD COMPUTING
Main Article Content
Abstract
With the rapid development of cloud services, huge volume of data is shared via cloud computing. Although cryptographic techniques have been utilized to provide data confidentiality in cloud computing, current mechanisms cannot enforce privacy concerns over cipher text associated with multiple owners, which makes co-owners unable to appropriately control whether data disseminators can actually disseminate their data. In this paper, we propose a secure data group sharing and conditional dissemination scheme with multi-owner in cloud computing, in which data owner can share private data with a group of users via the cloud in a secure way, and data disseminator can disseminate the data to a new group of users if the attributes satisfy the access policies in the cipher text. We further present a multiparty access control mechanism over the disseminated cipher text, in which the data co-owners can append new access policies to the cipher text due to their privacy preferences. Moreover, three policy aggregation strategies, including full permit, owner priority and majority permit, are provided to solve the pri vacy conflicts problem caused by different access policies. The security analysis and experimental results show our scheme is practical and efficient for secure data sharing with multi-owner in cloud computing.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
References
Z. Yan, X. Li, M. Wang, and A. V. Vasilakos, “Flexible data access control based on trust and reputation in cloud
computing,” IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 485-498, 2017.
B. Lang, J. Wang, and Y. Liu, “Achieving flexible and self-contained data protection in cloud computing,” IEEE
Access, vol. 5, pp. 1510- 1523, 2017.
Q. Zhang, L. T. Yang, and Z. Chen, “Privacy preserving deep computation model on cloud for big data feature
learning,” IEEE Transactions on Computers, vol. 65, no. 5, pp. 1351-1362, 2016.
H. Cui, X. Yi, and S. Nepal, “Achieving scalable access control over encrypted data for edge computing networks,”
IEEE Access, vol. 6, pp. 30049–30059, 2018.
K. Xue, W. Chen, W. Li, J. Hong, and P. Hong, “Combining data owner-side and cloud-side access control for
encrypted cloud storage,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2062–2074,
C. Delerablée, “Identity-based broadcast encryption with constant size ciphertexts and private keys,” Proc.
International Conf. on the Theory and Application of Cryptology and Information Security (ASIACRYPT‘2007), pp.
-215, 2007.
N. Paladi, C. Gehrmann, and A. Michalas, “Providing user security guarantees in public infrastructure clouds,”
IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 405-419, 2017.
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,” Proc. IEEE Symposium
on Security and Privacy (SP‘07), pp. 321-334, 2007.
L. Liu, Y. Zhang, and X. Li, “KeyD: secure key-deduplication with identity-based broadcast encryption,” IEEE
Transactions on Cloud Computing, 2018, https://ieeexplore.ieee.org/document/8458136.
Q. Huang, Y. Yang, and J. Fu, “Secure data group sharing and dissemination with attribute and time conditions
in Public Clouds,” IEEE Transactions on Services Computing, 2018, https://ieeexplore.ieee.org/document/8395392.
Box, “Understanding collaborator permission levels”, https://community. box.com/t5/Collaborate-By-InvitingOthers/Understanding-Collaborator-Permission-Levels/ta-p/144.
Microsoft OneDrive, “Document collaboration and co-authoring”, https://support.office.com/enus/article/document-collaborationand-co-authoring-ee1509b4-1f6e-401e-b04a-782d26f564a4.
H. He, R. Li, X. Dong, and Z. Zhang, “Secure, efficient and finegrained data access control mechanism for P2P
storage cloud,” IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 471-484, 2014.
Z. Qin, H. Xiong, S. Wu, and J. Batamuliza, “A survey of proxy reencryption for secure data sharing in cloud
computing,” IEEE Transactions on Services Computing, 2018, https://ieeexplore.ieee.org/document/7448446.
J. Son, D. Kim, R. Hussain, and H. Oh, “Conditional proxy reencryption for secure big data group sharing in
cloud environment,” Proc. of 2014 IEEE Conference on Computer Communications Workshops (INFOCOM
WKSHPS), pp. 541–546, 2014.
L. Jiang, and D. Guo “Dynamic encrypted data sharing scheme based on conditional proxy broadcast reencryption for cloud storage,” IEEE Access, vol. 5, pp. 13336 – 13345, 2017.