Skip to main content

SIDA: An Information Dispersal Based Encryption Algorithm

  • Conference paper
  • First Online:
Frontier Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 375))

  • 1899 Accesses

Abstract

High performance encryption is a key means to minimize security risks as protecting private data in cloud or big data environments. In this paper, a new encryption model SIDA is proposed based on the information dispersal and multi-layer encryption. From theoretical analysis and experiments, it shows that SIDA is secure, can not only significantly improve the speed of data encryption and decryption, but also reduce the bandwidth consumption and re-encryption overhead when revoking authority. Taking SIDA4 algorithm as an example, the encryption speed is about 1.6 times of AES. While the overhead of re-encryption when revoking authority, SIDA4 in communication and computation are 1/4 of AES.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li H, Sun WH, Li FH, Wan BY (2014) Secure and privacy-preserving data storage service in public cloud. J Comput Res Dev

    Google Scholar 

  2. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE symposium on security and privacy, pp 321–334, Piscataway, NJ. IEEE press, New York

    Google Scholar 

  3. Hong C, Zhang M, Feng DG (2010) AB-ACCS: a cryptographic access control scheme for cloud storage. J Comput Res Dev (Sup):259–265

    Google Scholar 

  4. Hong C, Zhang M, Feng DG (2011) Achieving efficient dynamic cryptographic access control in cloud storage. J Commun 32(7):125–132

    Google Scholar 

  5. Tian XX, Wang XL, Zhou AY (2009) DSP re-encryption: a flexible mechanism for access control enforcement management in DaaS. In: IEEE international conference on cloud computing (CLOUD’09), Bangalore, September 21–25, pp 25–32

    Google Scholar 

  6. Zhou DH (2013) Studies on proxy re-encryption schemes. Dissertation of Shanghai Jiaotong University

    Google Scholar 

  7. Vimercati SDC, Foresti S, Jajodia S, Paraboschi S, Samarati P (2007) Over-encryption: management of access control evolution on outsourced data. In: VLDB 2007, pp 123–134

    Google Scholar 

  8. Fu K (1999) Group sharing and random access in cryptographic storage file system, Master’s thesis, MIT

    Google Scholar 

  9. Sun H, Shieh S (1997) Optimal information-dispersal for increasing the reliability of a distributed service. IEEE Trans Reliab 46(4):462–472

    Article  Google Scholar 

  10. Zhao D, Burlingame K, Debains C et al (2013) Towards high-performance and cost-effective distributed storage systems with information dispersal algorithms. In: 2013 IEEE international conference on cluster computing, pp 1–5. IEEE, New York

    Google Scholar 

  11. Rabin M (1989) Efficient dispersal of information for security, load balancing, and fault tolerance. J ACM 36(2):335–348

    Article  MathSciNet  MATH  Google Scholar 

  12. Bian G, Gao S, Shao B (2011) Security structure of cloud storage based on dispersal. Acad J Xi’an Jiaotong Univ 45(4):41–45 (In Chinese)

    Google Scholar 

Download references

Acknowledgments

This work is partially supported by Shanghai Municipal Natural Science Foundation (13ZR1416100).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quan Qian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Yu, Zt., Qian, Q., Zhang, R., Hung, CL. (2016). SIDA: An Information Dispersal Based Encryption Algorithm. In: Hung, J., Yen, N., Li, KC. (eds) Frontier Computing. Lecture Notes in Electrical Engineering, vol 375. Springer, Singapore. https://doi.org/10.1007/978-981-10-0539-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0539-8_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0538-1

  • Online ISBN: 978-981-10-0539-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics