Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems

被引:0
|
作者
Kim, Byeori [1 ]
Choi, Minseong [1 ]
Youn, Taek-Young [2 ]
Yi, Jeong Hyun [1 ]
Cho, Haehyun [1 ]
机构
[1] Soongsil Univ, Seoul 06978, South Korea
[2] Dankook Univ, Yongin 16890, South Korea
来源
基金
新加坡国家研究基金会;
关键词
Cloud collaboration; mode of operation; auditability of ciphertext;
D O I
10.32604/iasc.2023.036574
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there has been a sudden shift from using traditional office applications to the collaborative cloud-based office suite such as Microsoft Office 365. Such cloud-based systems allow users to work together on the same docu-ment stored in a cloud server at once, by which users can effectively collaborate with each other. However, there are security concerns unsolved in using cloud col-laboration. One of the major concerns is the security of data stored in cloud ser-vers, which comes from the fact that data that multiple users are working together cannot be stored in encrypted form because of the dynamic characteristic of cloud collaboration. In this paper, we propose a novel mode of operation, DL-ECB, for AES by which we can modify, insert, and delete the ciphertext based on changes in plaintext. Therefore, we can use encrypted data in collaborative cloud-based platforms. To demonstrate that the DL-ECB mode can preserve the confidential-ity, integrity, and auditability of data used in collaborative cloud systems from adversaries, we implement and evaluate the prototype of the DL-ECB mode.
引用
收藏
页码:3725 / 3742
页数:18
相关论文
共 50 条
  • [1] CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems
    Bracciale, Lorenzo
    Loreti, Pierpaolo
    Raso, Emanuele
    Naldi, Maurizio
    Bianchi, Giuseppe
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 361 - 368
  • [2] A new cryptographic method for cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 58 - 65
  • [3] A new cryptographic primitive for noise tolerant template security
    Karabina, Koray
    Canpolat, Onur
    [J]. PATTERN RECOGNITION LETTERS, 2016, 80 : 70 - 75
  • [4] Cryptographic service optimization scheduling algorithm for collaborative jobs in cloud environment
    Cao, Xiaogang
    Li, Fenghua
    Geng, Kui
    Li, Zifu
    Kou, Wenlong
    [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (07): : 84 - 100
  • [5] A New Architecture for Developing Cryptographic Cloud Services
    Loruenser, Thomas
    Slamanig, Daniel
    Langer, Thomas
    Poehls, Henrich C.
    [J]. ERCIM NEWS, 2016, (106): : 18 - +
  • [6] NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA
    Burdusel, Laurentiu
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2013, 14 (01): : 72 - 77
  • [7] Cloud Storage Cost Modeling for Cryptographic File Systems
    Storch, Mauro
    De Rose, Cesar A. F.
    [J]. 2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 9 - 14
  • [8] Controlled operations as a cryptographic primitive
    Izotov, BV
    Moldovyan, AA
    Moldovyan, NA
    [J]. INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 230 - 241
  • [10] Cryptographic Public Verification of Data Integrity for Cloud Storage Systems
    Zhang, Yuan
    Xu, Chunxiang
    Li, Hongwei
    Liang, Xiaohui
    [J]. IEEE CLOUD COMPUTING, 2016, 3 (05): : 44 - 52