Abstract
Cloud storage services provide us convenience for storing and sharing vast amounts of data by its low cost, high scalability and other advantages while it brings out security risks as well. A user-controlled encrypted data sharing model in cloud storage (UESMCS) is put forward hereby. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Thus, the reliability and safety for data sharing can be achieved provided the trustworthy third party being brought in. The experimental results show that UESMCS ensures data security in cloud storage services platform and enhances the operational performance for data sharing. The security sharing mechanism perfectly fits the actual cloud storage environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a berkeley view of cloud computing. University of California, Berkeley, Technical report, USB-EECS- 2009-28 (2009)
Liu, Q., Wang, G.J., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258(10), 355–370 (2014)
Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011)
Sun, G.Z., Dong, Y., Li, Y.: CP-ABE based data access control for cloud storage. J. Commun. 32(7), 146–152 (2011)
Zhou, Z.B., Huang, D.J., Wang, Z.J.: Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans. Comput. 64(1), 126–138 (2015)
Jung, T., Li, X.Y., Wan, Z.G., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: Proceedings IEEE Infocom 2013, vol. 12, no. 11, pp. 2625–2633 (2013)
Dong, X., Yu, J.D., Luo, Y., Chen, Y.Y., Xue, G.T., Li, M.L.: Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Comput. Secur. 42(5), 151–164 (2014)
Yang, K., Jia, X.H., Ren, K., Zhang, B., Xie, R.T.: DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790–1801 (2013)
Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109–127. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00457-5_8
Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319–333. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10366-7_19
Zhu, Y., Hu, H.X., Ahn, G.J., Han, Y.J., Chen, S.M.: Collaborative integrity verification in hybrid clouds. Int. J. Cooper. Inf. Syst. 21(3), 191–200 (2012)
Zhu, Y., Ahn, G.J., Hu, H.X., Yau, S.S., An, H.G., Chen, S.M.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)
Wu, Y.Z., Liu, Q., Li, C.Y., Wang, G.J.: Research on cloud storage based network document sharing. J. Chin. Comput. Syst. 36(1), 95–99 (2015)
Acknowledgements
This paper is funded by the National Natural Science Foundation of China under grant numbers 61502163, 61632009, 61472451 and 61379058; the High Level Talents Program of Higher Education in Guangdong Province under Funding Support Number 2016ZJ01; the Hunan Provincial Natural Science Foundation of China under grant numbers 2016JJ5035, 2016JJ305 and 2015JJ3046; the Scientific Research Project of Hunan Province Department of Education under grant numbers 16C0481, 14A037 and 16A059; the Project of China packaging federation under Funding Support Number 2014GSZJWT001KT010, 17ZBLWT001KT010; the Scientific Research Project of Zhuzhou City Department of science and technology bureau under grant numbers 2016-68-12.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wu, Y., Chen, S., Wang, G., Li, C. (2018). User-Controlled Encrypted Data Sharing Model in Cloud Storage. In: Sun, G., Liu, S. (eds) Advanced Hybrid Information Processing. ADHIP 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 219. Springer, Cham. https://doi.org/10.1007/978-3-319-73317-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-73317-3_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73316-6
Online ISBN: 978-3-319-73317-3
eBook Packages: Computer ScienceComputer Science (R0)