Advertisement

Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption

  • Bing Rao
  • Zhigang Zhou
  • Hongli Zhang
  • Shuofei Tang
  • Renfu Yao
Part of the Communications in Computer and Information Science book series (CCIS, volume 320)

Abstract

Cloud computation allows the users with limited computing power outsource their data to the cloud of large-scale computing power through payment method. However, the security issue has been always the obstacles to the widely use of the computing outsourcing, especially when the end-user’s privacy data need to be processed on the cloud. Secure outsourcing mechanisms are in great need to not only protect privacy information, but also protect customers from malicious behaviors by validating the computation result. A mechanism of general secure computation outsourcing was recently shown to be feasible in theory, but to design mechanisms that are practically efficient is a very challenging problem. General research is based on a basic model. The model we used in this paper including Data Owner (DO), Cloud Service Provider (CSP) and End-User (EU). Focus on considering the DO, CSP and EU. Over-encryption is a good method to protect the security of the users’ data. Our proposal is based on the application of selective encryption as a means to enforce authorizations. Two layers of encryption are imposed on the data blocks. This paper talks about the over-encryption mechanism and proposes a novel over-encryption mechanism which can protect the security of the data on the Cloud. Last, we do some experiments to verify the performance of our mechanism.

Keywords

cloud outsourcing privacy-preserving over-encryption 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wang, W.C., Li, Z.W.: Secure and Efficient Access to Outsourced Data. In: ACM Workshop on Cloud Computing Security, New York, pp. 55–66 (2009)Google Scholar
  2. 2.
    Mell, T.P., Grance.: Draft Nist Working Definition of Cloud Computing (2010), http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
  3. 3.
    Open Crowd Cloud Taxomy (2009), http://www.opencrowd.com/views/cloud.php
  4. 4.
    Security Guidance for Critical Areas of Focus in Cloud Computing (2009), http://www.cloudsecurityalliance.org
  5. 5.
    Blaze, M.: Key Management in an Encrypting File System. In: Proceedings of the USENIX Summer Technical Conference, pp. 27–35 (1994)Google Scholar
  6. 6.
    di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of Access Control Evolution on Outsourced Data. In: Proceedings of the International Conference on Very Large Data Bases, pp. 123–134 (2007)Google Scholar
  7. 7.
    Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable Secure File Sharing on Untrusted Storage. In: Proceedings of the USENIX Conference on File and Storage Technologies, pp. 29–42 (2003)Google Scholar
  8. 8.
    Cong, W., Kui, R., Jia, W.: Secure and Practical Outsourcing of Linear Programming in Cloud Computing. In: IEEE International Conference on Computer Communications, pp. 820–828 (2011)Google Scholar
  9. 9.
    Chen, T., Chung, Y., Tian, C.: A novel key Management Scheme for Dynamic Access Control in a User Hierarchy. In: IEEE Annual International Computer Software and Applications Conference, pp. 396–401 (2004)Google Scholar
  10. 10.
    Chien, H., Jan, J.: New Hierarchical Assignment without Public Key Cryptography. Computers & Security 22(6), 523–526 (2003)CrossRefGoogle Scholar
  11. 11.
    Lin, C.: Hierarchical Key Assignment without Public-key Cryptography. Computers & Security 20(7), 612–619 (2001)CrossRefGoogle Scholar
  12. 12.
    Zhong, S.: A Practical Key Management Scheme for Access Control in a User Hierarchy. Computers & Security 21(8), 750–759 (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Bing Rao
    • 1
  • Zhigang Zhou
    • 1
  • Hongli Zhang
    • 1
  • Shuofei Tang
    • 1
  • Renfu Yao
    • 1
  1. 1.School of Computer Science and TechnologyHarbin Institute of TechnologyHarbinChina

Personalised recommendations