Skip to main content

Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 879))

Included in the following conference series:

  • 487 Accesses

Abstract

The explosive growth of information imposes a huge storage burden on the personal communication terminal and causes serious challenges to the communication bandwidth and security. Therefore, many compressive sensing (CS) encryption schemes are proposed to solve this problem. However, the decryption key in these papers needs to be shared with the users and cannot prevent the receivers from intentionally leaking the key. Once the key is compromised, the cloud system could not find the traitor who reveals the key. To address the problem, we propose the compressive sensing scheme with traitor tracing for cloud storage, which can ensure information security and simultaneously reduce the storage and transmission burden while maintaining low overhead at the user side. The work presented supports anonymous traitor tracking that can track any anonymous traitors who reveal their keys, so guarantee the security of the key. In addition, our scheme handles the ciphertext integrity protection and energy leakage in existing CS encryption schemes. Simulation results show that our scheme improves the overall compression and recovery performance compared to other CS encryption schemes. Our scheme can be used to efficiently encrypt sensitive information in online database, virtual currency, Internet of Things (IoT) and cloud encryption systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Candès, E.J., Romberg, J., Tao, T.: Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52(2), 489–509 (2006)

    Article  MathSciNet  Google Scholar 

  2. Candès, E.J., Tao, T.: Decoding by linear programming. IEEE Trans. Inf. Theory 51(12), 4203–4215 (2005)

    Article  MathSciNet  Google Scholar 

  3. Donoho, D.: Compressed sensing. IEEE Trans. Inf. Theory 52(4), 1289–1306 (2006). Author, F.: Contribution title. In: 9th International Proceedings on Proceedings, pp. 1–2. Publisher, Location (2010)

    Google Scholar 

  4. Candès, E.J., Tao, T.: Near-optimal signal recovery from random projections: universal encoding strategies. IEEE Trans. Inf. Theory 52(12), 5406–5425 (2006)

    Article  MathSciNet  Google Scholar 

  5. Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: 46th Annual Allerton Conference on Communication, Control, and Computing, pp. 813–817 (2008)

    Google Scholar 

  6. Zhang, M., Kermani, M.M., Raghunathan, A., Jha, N.K.: Energy-efficient and secure sensor data transmission using encompression. In: International Conference on VLSI Design and International Conference on Embedded Systems, pp. 31–36 (2013)

    Google Scholar 

  7. Gao, J., Zhang, X., Liang, H., Shen, X.S.: Joint encryption and compressed sensing in smart grid data transmission. In: Global Communications Conference, pp. 662–667 (2014)

    Google Scholar 

  8. Pudi, V., Chattopadhyay, A., Lam, K.-Y.: Secure and lightweight compressive sensing using stream cipher. IEEE Trans. Circuits Syst. II Express Briefs 65(3), 371–375

    Article  Google Scholar 

  9. Fay, R., Ruland, C.: Compressive sensing encryption modes and their security. In: Internet Technology & Secured Transactions, pp. 119–126 (2017)

    Google Scholar 

  10. Wang, C., Zhang, B., Ren, K., Roveda, J.M., Chen, C.W., Xu, Z.: A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing. In: IEEE INFOCOM, pp. 2130–2138 (2014)

    Google Scholar 

  11. Hung, T.H., Hsieh, S.H., Lu, C.S.: Privacy-preserving data collection and recovery of compressive sensing. In: IEEE China Summit & International Conference on Signal & Information Processing, pp. 473–477 (2015)

    Google Scholar 

  12. Xue, W., Luo, C., Lan, G., Rana, R., Hu, W., Seneviratne, A.: Kryptein: a compressive-sensing-based encryption scheme for the internet of things. In: ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2017), 12p, April 2017

    Google Scholar 

  13. Candès, E.: The restricted isometry property and its implications for compressed sensing. Comptes Rendus Mathematique 346(9), 589–592 (2008)

    Article  MathSciNet  Google Scholar 

  14. Chor, B., Fiat, A., Naor, M.: Tracing traitors. IEEE Trans. Inf. Theory 6, 257–270 (1994)

    MATH  Google Scholar 

  15. Boneh, D., Franklin, M.: An efficient public key traitor tracing scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338–353. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_22

    Chapter  Google Scholar 

  16. Yuji, W., Coichiro, H., Hideki, L.: Efficient public key traitor tracing scheme. In: Proceedings of the CT-RSA 2001, Springer, Berlin (2001)

    Google Scholar 

  17. Boneh, D., Sahai, A., Waters, B.: Full collusion resistant traitor tracing with short cipher ciphertext and private keys. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM, New York (2006)

    Google Scholar 

  18. Wang, Q.L., Yang, B., Han, Z.: Free conspiracy public key traitor tracking scheme. J. Commun. 12, 6–9 (2006)

    Google Scholar 

  19. Han, L.L., He, S.F., et al.: An anonymous public key traitor tracing scheme. J. ChangSha Univ. 9(30), 62–65 (2016)

    Google Scholar 

  20. Rana, R., Yang, M., Wark, T., Chou, C.T., Hu, W.: SimpleTrack: adaptive trajectory compression with deterministic projection matrix for mobile sensor networks. Sens. J. IEEE 15(1), 365–373 (2015)

    Article  Google Scholar 

  21. Kargupta, H., Data, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of ICDM, pp. 99–106. IEEE (2003)

    Google Scholar 

  22. Agrawal, S., Vishwanath, S.: Secrecy using compressive sensing. In: Information theory workshop (ITW), pp 563–567. IEEE (2011)

    Google Scholar 

  23. Landau, H.J.: Sampling, data transmission, and the Nyquist rate. Proc. IEEE 55(10), 1701–1706 (1967)

    Article  Google Scholar 

  24. Qi, J., Hu, X., Ma, Y., Sun, Y.: A hybrid security and compressive sensing-based sensor data gathering scheme. IEEE Access 3, 718–724 (2015)

    Article  Google Scholar 

  25. Fay, R., Ruland, C.: Compressed sampling and authenticated-encryption. In: SCC; International ITG Conference on Systems (2017)

    Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Key Research and Development Program of China (No. 2016YFB0800601), the Natural Science Foundation of China (No. 61303217, 61502372), the Natural Science Foundation of Shaanxi province (No. 2013JQ8002, 2014JQ8313).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juntao Gao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, P., Gao, J., Jia, W., Li, X. (2018). Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3095-7_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3094-0

  • Online ISBN: 978-981-13-3095-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics