Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption

被引:0
|
作者
Zhu, Shuaishuai [1 ]
Han, Yiliang [1 ]
Wei, Yuechuan [1 ]
机构
[1] Engn Univ CAPF, Dept Elect, Network & Informat Secur Key Lab CAPF, Xian, Peoples R China
关键词
Cloud Computing; Outsourcing Data; Data Privacy; Database Management;
D O I
10.1109/INCoS.2015.29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In our IT society, cloud computing is clearly becoming one of the dominating infrastructures for enterprises as long as end users. As more cloud based services available to end users, their oceans of data are outsourced in the cloud as well. Without any special mechanisms, the data may be leaked to a third party for unauthorized use. Most presented works of cloud computing put these emphases on computing utility or new types of applications. But in the view of cloud users, such as traditional big companies, data in cloud computing systems is tend to be out of control and privacy fragile. So most of data they outsourced is less important. A mechanism to guarantee the ownership of data is required. In this paper, we analyzed a couple of recently presented scalable data management models to describe the storage patterns of data in cloud computing systems. Then we defined a new tree-based dataset management model to solve the storage and sharing problems in cloud computing. A couple of operation strategies including data encryption, data boundary maintenance, and data proof are extracted from the view of different entities in the cloud. The behaviors of different users are controlled by view management on the tree. Based on these strategies, a flexible data management mechanism is designed in the model to guarantee entity privacy, data availability and secure data sharing.
引用
下载
收藏
页码:257 / 261
页数:5
相关论文
共 50 条
  • [21] An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
    Wang, Shulan
    Zhou, Junwei
    Liu, Joseph K.
    Yu, Jianping
    Chen, Jianyong
    Xie, Weixin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1265 - 1277
  • [22] BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification
    Li, Peiyao
    Cao, Heyang
    Wang, Mingsheng
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [23] Unified Ciphertext-Policy Weighted Attribute-Based Encryption for Sharing Data in Cloud Computing
    Li, Wei
    Ni, Wei
    Liu, Dongxi
    Liu, Ren Ping
    Luo, Shoushan
    APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [24] Blowfish Hybridized Weighted Attribute-Based Encryption for Secure and Efficient Data Collaboration in Cloud Computing
    Ghosh, Smarajit
    Karar, Vinod
    APPLIED SCIENCES-BASEL, 2018, 8 (07):
  • [26] Attribute-Based Online/Offline Encryption with Outsourcing Decryption
    Wang, Zhan-Jun
    Ma, Hai-Ying
    Wang, Jin-Hua
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (06) : 1595 - 1611
  • [27] Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments
    Xie, Chenlu
    Shi, Run-hua
    Zhang, Xiaoxu
    Wang, Pengbo
    Guo, Wanpeng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [28] Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
    School of Mathematics and Statistics, Xidian Univ., Xi'an
    710071, China
    Xi'an Dianzi Keji Daxue Xuebao, 6 (6-10 and 55):
  • [29] Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
    Chen H.-S.
    Shen Q.-L.
    2018, Beijing University of Posts and Telecommunications (41): : 113 - 118
  • [30] Efficient Anonymous Attribute-Based Encryption with Access Policy Hidden for Cloud Computing
    Huang, Chanying
    Yan, Kedong
    Wei, Songjie
    Zhang, Gongxuan
    Lee, Dong Hoon
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 266 - 270