Abstract
High performance encryption is a key means to minimize security risks as protecting private data in cloud or big data environments. In this paper, a new encryption model SIDA is proposed based on the information dispersal and multi-layer encryption. From theoretical analysis and experiments, it shows that SIDA is secure, can not only significantly improve the speed of data encryption and decryption, but also reduce the bandwidth consumption and re-encryption overhead when revoking authority. Taking SIDA4 algorithm as an example, the encryption speed is about 1.6 times of AES. While the overhead of re-encryption when revoking authority, SIDA4 in communication and computation are 1/4 of AES.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li H, Sun WH, Li FH, Wan BY (2014) Secure and privacy-preserving data storage service in public cloud. J Comput Res Dev
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE symposium on security and privacy, pp 321–334, Piscataway, NJ. IEEE press, New York
Hong C, Zhang M, Feng DG (2010) AB-ACCS: a cryptographic access control scheme for cloud storage. J Comput Res Dev (Sup):259–265
Hong C, Zhang M, Feng DG (2011) Achieving efficient dynamic cryptographic access control in cloud storage. J Commun 32(7):125–132
Tian XX, Wang XL, Zhou AY (2009) DSP re-encryption: a flexible mechanism for access control enforcement management in DaaS. In: IEEE international conference on cloud computing (CLOUD’09), Bangalore, September 21–25, pp 25–32
Zhou DH (2013) Studies on proxy re-encryption schemes. Dissertation of Shanghai Jiaotong University
Vimercati SDC, Foresti S, Jajodia S, Paraboschi S, Samarati P (2007) Over-encryption: management of access control evolution on outsourced data. In: VLDB 2007, pp 123–134
Fu K (1999) Group sharing and random access in cryptographic storage file system, Master’s thesis, MIT
Sun H, Shieh S (1997) Optimal information-dispersal for increasing the reliability of a distributed service. IEEE Trans Reliab 46(4):462–472
Zhao D, Burlingame K, Debains C et al (2013) Towards high-performance and cost-effective distributed storage systems with information dispersal algorithms. In: 2013 IEEE international conference on cluster computing, pp 1–5. IEEE, New York
Rabin M (1989) Efficient dispersal of information for security, load balancing, and fault tolerance. J ACM 36(2):335–348
Bian G, Gao S, Shao B (2011) Security structure of cloud storage based on dispersal. Acad J Xi’an Jiaotong Univ 45(4):41–45 (In Chinese)
Acknowledgments
This work is partially supported by Shanghai Municipal Natural Science Foundation (13ZR1416100).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Yu, Zt., Qian, Q., Zhang, R., Hung, CL. (2016). SIDA: An Information Dispersal Based Encryption Algorithm. In: Hung, J., Yen, N., Li, KC. (eds) Frontier Computing. Lecture Notes in Electrical Engineering, vol 375. Springer, Singapore. https://doi.org/10.1007/978-981-10-0539-8_25
Download citation
DOI: https://doi.org/10.1007/978-981-10-0539-8_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0538-1
Online ISBN: 978-981-10-0539-8
eBook Packages: Computer ScienceComputer Science (R0)