Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption
Cloud computation allows the users with limited computing power outsource their data to the cloud of large-scale computing power through payment method. However, the security issue has been always the obstacles to the widely use of the computing outsourcing, especially when the end-user’s privacy data need to be processed on the cloud. Secure outsourcing mechanisms are in great need to not only protect privacy information, but also protect customers from malicious behaviors by validating the computation result. A mechanism of general secure computation outsourcing was recently shown to be feasible in theory, but to design mechanisms that are practically efficient is a very challenging problem. General research is based on a basic model. The model we used in this paper including Data Owner (DO), Cloud Service Provider (CSP) and End-User (EU). Focus on considering the DO, CSP and EU. Over-encryption is a good method to protect the security of the users’ data. Our proposal is based on the application of selective encryption as a means to enforce authorizations. Two layers of encryption are imposed on the data blocks. This paper talks about the over-encryption mechanism and proposes a novel over-encryption mechanism which can protect the security of the data on the Cloud. Last, we do some experiments to verify the performance of our mechanism.
Keywordscloud outsourcing privacy-preserving over-encryption
Unable to display preview. Download preview PDF.
- 1.Wang, W.C., Li, Z.W.: Secure and Efficient Access to Outsourced Data. In: ACM Workshop on Cloud Computing Security, New York, pp. 55–66 (2009)Google Scholar
- 2.Mell, T.P., Grance.: Draft Nist Working Definition of Cloud Computing (2010), http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
- 3.Open Crowd Cloud Taxomy (2009), http://www.opencrowd.com/views/cloud.php
- 4.Security Guidance for Critical Areas of Focus in Cloud Computing (2009), http://www.cloudsecurityalliance.org
- 5.Blaze, M.: Key Management in an Encrypting File System. In: Proceedings of the USENIX Summer Technical Conference, pp. 27–35 (1994)Google Scholar
- 6.di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of Access Control Evolution on Outsourced Data. In: Proceedings of the International Conference on Very Large Data Bases, pp. 123–134 (2007)Google Scholar
- 7.Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable Secure File Sharing on Untrusted Storage. In: Proceedings of the USENIX Conference on File and Storage Technologies, pp. 29–42 (2003)Google Scholar
- 8.Cong, W., Kui, R., Jia, W.: Secure and Practical Outsourcing of Linear Programming in Cloud Computing. In: IEEE International Conference on Computer Communications, pp. 820–828 (2011)Google Scholar
- 9.Chen, T., Chung, Y., Tian, C.: A novel key Management Scheme for Dynamic Access Control in a User Hierarchy. In: IEEE Annual International Computer Software and Applications Conference, pp. 396–401 (2004)Google Scholar