Secure data-sharing using distributed environmental matching keys

被引:5
|
作者
Tsai, Kun-Lin [1 ]
Leu, Fang-Yie [2 ]
机构
[1] Tunghai Univ, Dept Elect Engn, 1727,Sect 4,Taiwan Blvd, Taichung 40704, Taiwan
[2] Tunghai Univ, Dept Comp Sci, 1727,Sect 4,Taiwan Blvd, Taichung 40704, Taiwan
关键词
Data sharing; Data encryption; Cloud storage; Group key; Environmental matching key; CLOUD STORAGE; ENCRYPTION; SERVICES;
D O I
10.1016/j.pmcj.2017.09.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past decade, with the development of data-sharing on cloud storage, people can access their personal or commercial data stored in different systems or devices anytime and anywhere. However, the shared data is distributed over many cloud storages. This may increase the risk of unauthorized access or even insider threats. Many commercial cloud storages provide data encryption service with extra charge; however, such service often encrypts data by using only one encryption key. When the authorized users of one group would like to access the shared data, they need to own the same decryption key, i. e., group key, which may rise the risk of data leakage, especially when the key is hacked. Multi-key encryption is another way to protect the shared data. But it is hard to manage multiple keys and share them with other authorized users, especially in a cloud environment. To provide a secure and effective data sharing method in a cloud environment, in this paper, we construct a secure cloud data encryption protocol, named the Environmental Matching key based Data-Sharing protocol (EMaDS in short). The EMaDS encrypts shared data by using one encryption key which combines several environmental matching keys derived from authorized user's password and a trust device's hardware/software configuration. Our security analyses show that the EMaDS is able to resist machine-specific data leakage, replay attack, eavesdropping attack, impersonation attack, forgery attack, and known-key attack. Besides, the mathematical proof also shows the probability with which to generate the same environmental matching key by using the same trusted device is less than 1/w(m)xw!, wherewis the number of parameters of a trusted device, andmis the number of parameters chosen for generating environmental matching key. When the trusted device is different, it is absolutely impossible to generate the same environmental matching key. These analyses conclude that the EMaDS is very suitable for group data sharing under heterogeneous environments and is practically useful in business. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:513 / 525
页数:13
相关论文
共 50 条
  • [1] Secure and efficient data-sharing in clouds
    Zhang, Jiang
    Zhang, Zhenfeng
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 2125 - 2143
  • [2] A blockchain-based traceable and secure data-sharing scheme
    Wang Z.
    Guan S.
    [J]. PeerJ Computer Science, 2023, 9
  • [3] A blockchain-based traceable and secure data-sharing scheme
    Wang, Zhenqi
    Guan, Shaopeng
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [4] Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust
    Hu, Yuncong
    Kumar, Sam
    Popa, Raluca Ada
    [J]. PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2020, : 851 - 877
  • [5] DSVN: A Flexible and Secure Data-Sharing Model for VANET Based on Blockchain
    Chen, Xiaoxuan
    Chen, Yineng
    Wang, Xiayu
    Zhu, Xinghui
    Fang, Kui
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [6] The Data-Sharing Dilemma
    Mullin, Rick
    [J]. CHEMICAL & ENGINEERING NEWS, 2013, 91 (17) : 22 - 22
  • [7] Towards a Policy-Based Distributed Data-Sharing Economy
    Cauvin, Samuel R.
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS (AAMAS' 18), 2018, : 1733 - 1734
  • [8] Distributed Data-Sharing Consensus in Cooperative Perception of Autonomous Vehicles
    Qiu, Chenxi
    Yadav, Sourabh
    Squicciarini, Anna
    Yang, Qing
    Fu, Song
    Zhao, Juanjuan
    Xu, Chengzhong
    [J]. 2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, : 1212 - 1222
  • [9] SSeCloud: Using secret sharing scheme to secure keys
    Hu, Liang
    Huang, Yang
    Yang, Disheng
    Zhang, Yuzhen
    Liu, Hengchang
    [J]. 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017), 2017, 81
  • [10] Data-Sharing Models
    Sotos, John G.
    Huyen, Yentram
    Borrelli, Alice
    [J]. NEW ENGLAND JOURNAL OF MEDICINE, 2017, 376 (23): : 2305 - 2305