Index Generation and Secure Multi-User Access Control over an Encrypted Cloud Data

被引:9
|
作者
Raghavendra, S. [1 ]
Meghana, K. [1 ]
Doddabasappa, P. A. [1 ]
Geeta, C. M. [1 ]
Buyya, Rajkumar [2 ]
Venugopal, K. R. [1 ]
Iyengar, S. S. [3 ]
Patnaik, L. M. [4 ]
机构
[1] Univ Visvesvaraya, Coll Engn, Bangalore, Karnataka, India
[2] Univ Melbourne, Melbourne, Vic 3010, Australia
[3] Florida Int Univ, Miami, FL 33199 USA
[4] Indian Inst Sci Campus, Natl Inst Adv Studies, Bangalore, Karnataka, India
关键词
Access Control; Cloud Computing; Key Generation; Keyword Search; Storage and Retrieval;
D O I
10.1016/j.procs.2016.06.062
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing provides economical and effective solution for sharing data among cloud users with low maintenance cost. The security of data and identity confidentiality while sharing data in multi-owner way cannot be assured by the Cloud Service Providers (CSP's). The Cloud Service Providers are reliable but curious to know the recurrent membership changes in the cloud. In this paper, we propose a secure multi-owner data sharing for dynamic group in the cloud with RSA Chinese Remainder Theorem (RSA-CRT) encryption technique and substring index generation method. RSA-CRT efficiently manages revocation list, key management, with reduced storage and computational overhead. The substring Index generation algorithm reduces the storage space compared to wild card fuzzy alogorithm(1). (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:293 / 300
页数:8
相关论文
共 50 条
  • [31] DNA Similarity Search With Access Control Over Encrypted Cloud Data
    Xu, Guowen
    Li, Hongwei
    Ren, Hao
    Lin, Xiaodong
    Shen, Xuemin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) : 1233 - 1252
  • [32] Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language
    Yang, Yang
    Liu, Ximeng
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 320 - 334
  • [33] Improvement of Multi-user Searchable Encrypted Data Scheme
    Tran Thao Phuong
    Omote, Kazumasa
    Nguyen Gia Luyen
    Nguyen Dinh Thuc
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 396 - 401
  • [34] Keyword Search with Access Control over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 87 - 92
  • [35] Secure Search over Encrypted Enterprise Data in the Cloud
    Wang, Kaishi
    Guo, Jiaqi
    International Journal of Network Security, 2023, 25 (01) : 103 - 112
  • [36] Survey on secure search over encrypted data on the cloud
    Hoang Pham
    Woodworth, Jason
    Salehi, Mohsen Amini
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (17):
  • [37] Secure Search Over Encrypted Data in Cloud Computing
    Bakhtiari, Majid
    Nateghizad, Majid
    Zainal, Anazida
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 290 - 295
  • [38] Search Over Encrypted Cloud Data With Secure Updates
    Ocansey, Selasi Kwame
    Wang, Changda
    2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 380 - 386
  • [39] Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search
    Zhao, Fangming
    Nishide, Takashi
    Sakurai, Kouichi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (07): : 1790 - 1803
  • [40] Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) : 1947 - 1960