Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption

被引:0
|
作者
Zhu, Shuaishuai [1 ]
Han, Yiliang [1 ]
Wei, Yuechuan [1 ]
机构
[1] Engn Univ CAPF, Dept Elect, Network & Informat Secur Key Lab CAPF, Xian, Peoples R China
关键词
Cloud Computing; Outsourcing Data; Data Privacy; Database Management;
D O I
10.1109/INCoS.2015.29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In our IT society, cloud computing is clearly becoming one of the dominating infrastructures for enterprises as long as end users. As more cloud based services available to end users, their oceans of data are outsourced in the cloud as well. Without any special mechanisms, the data may be leaked to a third party for unauthorized use. Most presented works of cloud computing put these emphases on computing utility or new types of applications. But in the view of cloud users, such as traditional big companies, data in cloud computing systems is tend to be out of control and privacy fragile. So most of data they outsourced is less important. A mechanism to guarantee the ownership of data is required. In this paper, we analyzed a couple of recently presented scalable data management models to describe the storage patterns of data in cloud computing systems. Then we defined a new tree-based dataset management model to solve the storage and sharing problems in cloud computing. A couple of operation strategies including data encryption, data boundary maintenance, and data proof are extracted from the view of different entities in the cloud. The behaviors of different users are controlled by view management on the tree. Based on these strategies, a flexible data management mechanism is designed in the model to guarantee entity privacy, data availability and secure data sharing.
引用
下载
收藏
页码:257 / 261
页数:5
相关论文
共 50 条
  • [1] Survey on attribute-based encryption in cloud computing
    Ancy, P.R.
    Krishna, Addapalli V.N.
    Balachandran, K.
    Balamurugan, M.
    Prakasi, O.S. Gnana
    Ancy, P.R. (ancy.prasadam@res.christuniversity.in), 1600, Femto Technique Co., Ltd. (22): : 863 - 868
  • [2] Attribute-based Encryption in Cloud Computing Environment
    Yan, Yuping
    Kamel, Mohammed B. M.
    Ligeti, Peter
    2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, : 63 - 68
  • [3] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577
  • [4] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    INFOCOMMUNICATIONS JOURNAL, 2015, 7 (02): : 1 - 9
  • [5] A Comparative Study of Attribute-Based Encryption Schemes for Secure Cloud Data Outsourcing
    Thangavel, M.
    Varalakshmi, P.
    Abinaya, C.
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 261 - 266
  • [6] An improved attribute-based encryption technique towards the data security in cloud computing
    Namasudra, Suyel
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (03):
  • [7] Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
    Huang, Qinlong
    Yang, Yixian
    Shen, Mansuo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 239 - 249
  • [8] Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
    Liu, Hongwei
    Zhu, Ping
    Chen, Zehong
    Zhang, Peng
    Jiang, Zoe L.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 556 - 561
  • [9] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao J.
    Sun J.
    Qin J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [10] TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing
    Li, Youhuizi
    Dong, Zeyong
    Sha, Kewei
    Jiang, Congfeng
    Wan, Jian
    Wang, Yuan
    IEEE ACCESS, 2019, 7 : 40240 - 40257