Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage

被引:6
|
作者
Hou, Huiying [1 ]
Ning, Jianting [2 ,3 ]
Zhao, Yunlei [1 ,4 ]
Deng, Robert [5 ]
机构
[1] Fudan Univ, Coll Comp Sci & Technol, Shanghai 200433, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyher Secur, Fuzhou 350117, Fujian, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[5] Singapore Management Univ, Secure Mobile Ctr, Sch Informat Syst, Singapore 178902, Singapore
基金
上海市科技启明星计划; 中国国家自然科学基金;
关键词
Cloud computing; Security; Digital signatures; Standards; Encryption; Economics; Data models; Cloud storage; data sharing; accountability; attribute-based cryptography; sanitizable signature; ATTRIBUTE-BASED SIGNATURE;
D O I
10.1109/TDSC.2021.3100401
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing cloud storage service, users can enjoy non-interactive data sharing. Nonetheless, the data owner cannot timely update the shared data all the while. To ensure the timeliness and the authoritative source of the data, some users should be allowed to update the data on behalf of an authoritative data owner without changing data source. However, this allows harmful information to be injected into the data unnoticeably. How to efficiently realize editable cloud-based data sharing supporting malicious user tracing has not been fully explored. To address the problem, we propose a fine-grained and controllably editable cloud-based data sharing scheme with malicious user accountability. The data owner only needs to sign the shared data before uploading it and can specify a fine-grained access control policy about who can update the data and which portions of the data can be updated. The authorized users non-interactively convert signatures of original data into new ones for the updated data, which are indistinguishable from the original signatures. The proposed scheme also supports malicious user accountability in the sense that malicious users who post harmful information can be traced. We demonstrate the security and practicality of our scheme via formal security analysis and extensive experiments.
引用
收藏
页码:3448 / 3463
页数:16
相关论文
empty
未找到相关数据