Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems

被引:0
|
作者
Kim, Byeori [1 ]
Choi, Minseong [1 ]
Youn, Taek-Young [2 ]
Yi, Jeong Hyun [1 ]
Cho, Haehyun [1 ]
机构
[1] Soongsil Univ, Seoul 06978, South Korea
[2] Dankook Univ, Yongin 16890, South Korea
来源
基金
新加坡国家研究基金会;
关键词
Cloud collaboration; mode of operation; auditability of ciphertext;
D O I
10.32604/iasc.2023.036574
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there has been a sudden shift from using traditional office applications to the collaborative cloud-based office suite such as Microsoft Office 365. Such cloud-based systems allow users to work together on the same docu-ment stored in a cloud server at once, by which users can effectively collaborate with each other. However, there are security concerns unsolved in using cloud col-laboration. One of the major concerns is the security of data stored in cloud ser-vers, which comes from the fact that data that multiple users are working together cannot be stored in encrypted form because of the dynamic characteristic of cloud collaboration. In this paper, we propose a novel mode of operation, DL-ECB, for AES by which we can modify, insert, and delete the ciphertext based on changes in plaintext. Therefore, we can use encrypted data in collaborative cloud-based platforms. To demonstrate that the DL-ECB mode can preserve the confidential-ity, integrity, and auditability of data used in collaborative cloud systems from adversaries, we implement and evaluate the prototype of the DL-ECB mode.
引用
收藏
页码:3725 / 3742
页数:18
相关论文
共 50 条
  • [31] A Collaborative Trust Calculation Scheme for Cloud Computing Systems
    Singh, Sarbjeet
    Sidhu, Jagpreet
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [32] Enhanced Matrix Power Function for Cryptographic Primitive Construction
    Sakalauskas, Eligijus
    [J]. SYMMETRY-BASEL, 2018, 10 (02):
  • [33] On Secure Outsourcing of Cryptographic Computations to Cloud
    Kuppusamy, Lakshmi
    Rangasamy, Jothi
    Gauravaram, Praveen
    [J]. SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 63 - 67
  • [34] Helix: Fast encryption and authentication in a single cryptographic primitive
    Ferguson, N
    Whiting, D
    Schneier, B
    Kelsey, J
    Lucks, S
    Kohno, T
    [J]. FAST SOFTWARE ENCRYPTION, 2003, 2887 : 330 - 346
  • [35] LFCSR: A Novel FCSR-Based Cryptographic Primitive
    LFCSR: 基于FCSR的新密码学部件
    [J]. 1924, Chinese Institute of Electronics (46):
  • [36] A cryptographic primitive based on hidden-order groups
    Saxena, Amitabh
    Soh, Ben
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2009, 3 (02) : 89 - 132
  • [37] Cryptographic Protocols for Secure Cloud Computing
    Alhumrani, S. A.
    Kar, Jayaprakash
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 301 - 310
  • [38] Verification of a Cryptographic Primitive: SHA-256 (Abstract)
    Appel, Andrew W.
    [J]. ACM SIGPLAN NOTICES, 2015, 50 (06) : 153 - 164
  • [39] Calculating a Cryptographic Primitive: Suitable for Wireless Sensor Networks
    Suthaharan, Shan
    [J]. ATNAC: 2008 AUSTRALASIAN TELECOMMUNICATION NETWOKS AND APPLICATIONS CONFERENCE, 2008, : 51 - 56
  • [40] Securing Cryptographic Keys in the Cloud: A Survey
    AlBelooshi, Bushra
    Damiani, Ernesto
    Salah, Khaled
    Martin, Thomas
    [J]. IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +