SafeBox: A Scheme for Searching and Sharing Encrypted Data in Cloud Applications

被引:0
|
作者
Wang, Guofeng [1 ]
Liu, Chuanyi [2 ]
Dong, Yingfei [3 ]
Pan, Hezhong [1 ]
Han, Peiyi [1 ]
Fang, Binxing [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing, Peoples R China
[2] Harbin Inst Technol Shenzhen, Sch Comp & Technol, Shenzhen, Peoples R China
[3] Univ Hawaii, Dept Elect & Comp Engn, Honolulu, HI 96822 USA
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
Cloud Data Security; Searchable Encryption; Encrypted Data Sharing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Confidential data is often encrypted before it is uploaded to cloud servers. However, client-controlled encryption often poses a major barrier towards the full functionalities of cloud services. This paper presents SafeBox, a new Cloud Access Security Broker (CASB)-based approach that protects sensitive information against attackers with full control of cloud servers, and allows clients to search and share encrypted data transparently. It addresses the following challenges: First, SafeBox brings almost no loss of functionalities for protecting sensitive information in cloud applications. It safeguards not only textual input data but also uploaded files. Second, it allows a server to perform keyword-based searching over encrypted contents, and does not modify the current cloud interfaces or users' habits. Finally, it enables encrypted data sharing between different brokers efficiently. Our experimental evaluations on multiple cloud applications show that SafeBox has modest overheads and can be applied to practical use.
引用
收藏
页码:648 / 653
页数:6
相关论文
共 50 条
  • [1] Using secret sharing for searching in encrypted data
    Brinkman, R
    Doumen, J
    Jonker, W
    [J]. SECURE DATA MANAGEMENT, PROCEEDINGS, 2004, 3178 : 18 - 27
  • [2] Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data
    Liang, Kaitai
    Su, Chunhua
    Chen, Jiageng
    Liu, Joseph K.
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 83 - 94
  • [3] A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud
    Yang, Wenyuan
    Zhu, Yuesheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 100 - 115
  • [4] Recent Developments in Searching Over Encrypted Cloud Data
    Mittal, Sneha A.
    Krishna, C. Rama
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 338 - 342
  • [5] Selective Sharing of Outsourced Encrypted Data in Cloud Environments
    Sifah, Emmanuel Boateng
    Xia, Qi
    Xia, Hu
    Agyekum, Kwame Opuni-Boachie Obour
    Acheampong, Kingsley Nketia
    Cobblah, Christian Nii Aflah
    Gao, Jianbin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (18) : 14141 - 14155
  • [6] Encrypted Phrase Searching in the Cloud
    Zittrower, Steven
    Zou, Cliff C.
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 764 - 770
  • [7] Encrypted Data Searching Techniques and Approaches for Cloud Computing: A Survey
    Mohan, Lija
    Elayidom, M. Sudheep
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 97 - 104
  • [8] A Novel Data Deduplication Scheme for Encrypted Cloud Databases
    Li, Jung-Shian
    Liu, I-Hsien
    Lee, Chao-Yuan
    Li, Chu-Fen
    Liu, Chuan-Gang
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (04): : 1115 - 1125
  • [9] A Confidentiality Scheme for Storing Encrypted Data through Cloud
    Timraz, Karim
    Barhoom, Tawfiq
    Fatayer, Tamer
    [J]. 2019 IEEE 7TH PALESTINIAN INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (PICECE), 2019,
  • [10] Phrase Searching for Encrypted Cloud Storage
    Gaware, Ankita J.
    Theng, Deepti. P.
    [J]. HELIX, 2018, 8 (05): : 3746 - 3749