Skip to main content

User-Controlled Encrypted Data Sharing Model in Cloud Storage

  • Conference paper
  • First Online:
Advanced Hybrid Information Processing (ADHIP 2017)

Abstract

Cloud storage services provide us convenience for storing and sharing vast amounts of data by its low cost, high scalability and other advantages while it brings out security risks as well. A user-controlled encrypted data sharing model in cloud storage (UESMCS) is put forward hereby. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Thus, the reliability and safety for data sharing can be achieved provided the trustworthy third party being brought in. The experimental results show that UESMCS ensures data security in cloud storage services platform and enhances the operational performance for data sharing. The security sharing mechanism perfectly fits the actual cloud storage environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a berkeley view of cloud computing. University of California, Berkeley, Technical report, USB-EECS- 2009-28 (2009)

    Google Scholar 

  2. Liu, Q., Wang, G.J., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258(10), 355–370 (2014)

    Article  Google Scholar 

  3. Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011)

    Article  Google Scholar 

  4. Sun, G.Z., Dong, Y., Li, Y.: CP-ABE based data access control for cloud storage. J. Commun. 32(7), 146–152 (2011)

    Google Scholar 

  5. Zhou, Z.B., Huang, D.J., Wang, Z.J.: Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans. Comput. 64(1), 126–138 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  6. Jung, T., Li, X.Y., Wan, Z.G., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: Proceedings IEEE Infocom 2013, vol. 12, no. 11, pp. 2625–2633 (2013)

    Google Scholar 

  7. Dong, X., Yu, J.D., Luo, Y., Chen, Y.Y., Xue, G.T., Li, M.L.: Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Comput. Secur. 42(5), 151–164 (2014)

    Article  Google Scholar 

  8. Yang, K., Jia, X.H., Ren, K., Zhang, B., Xie, R.T.: DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790–1801 (2013)

    Article  Google Scholar 

  9. Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109–127. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00457-5_8

    Chapter  Google Scholar 

  10. Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319–333. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10366-7_19

    Chapter  Google Scholar 

  11. Zhu, Y., Hu, H.X., Ahn, G.J., Han, Y.J., Chen, S.M.: Collaborative integrity verification in hybrid clouds. Int. J. Cooper. Inf. Syst. 21(3), 191–200 (2012)

    Article  Google Scholar 

  12. Zhu, Y., Ahn, G.J., Hu, H.X., Yau, S.S., An, H.G., Chen, S.M.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)

    Google Scholar 

  13. Wu, Y.Z., Liu, Q., Li, C.Y., Wang, G.J.: Research on cloud storage based network document sharing. J. Chin. Comput. Syst. 36(1), 95–99 (2015)

    Google Scholar 

Download references

Acknowledgements

This paper is funded by the National Natural Science Foundation of China under grant numbers 61502163, 61632009, 61472451 and 61379058; the High Level Talents Program of Higher Education in Guangdong Province under Funding Support Number 2016ZJ01; the Hunan Provincial Natural Science Foundation of China under grant numbers 2016JJ5035, 2016JJ305 and 2015JJ3046; the Scientific Research Project of Hunan Province Department of Education under grant numbers 16C0481, 14A037 and 16A059; the Project of China packaging federation under Funding Support Number 2014GSZJWT001KT010, 17ZBLWT001KT010; the Scientific Research Project of Zhuzhou City Department of science and technology bureau under grant numbers 2016-68-12.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuhong Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, Y., Chen, S., Wang, G., Li, C. (2018). User-Controlled Encrypted Data Sharing Model in Cloud Storage. In: Sun, G., Liu, S. (eds) Advanced Hybrid Information Processing. ADHIP 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 219. Springer, Cham. https://doi.org/10.1007/978-3-319-73317-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73317-3_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73316-6

  • Online ISBN: 978-3-319-73317-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics