A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing

被引:0
|
作者
Wang, Xin [1 ,2 ,3 ]
Yang, Bo [1 ,3 ]
Xia, Zhe [4 ]
Zhao, Yanqi [1 ]
Yu, Huifang [5 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Shaanxi, Peoples R China
[2] Shaanxi Univ Sci & Technol, Coll Elect & Informat Engn, Xian 710021, Shaanxi, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Wuhan Univ Technol, Sch Comp Sci & Technol, Wuhan 430070, Hubei, Peoples R China
[5] Xian Univ Posts & Telecommun, Sch Commun & Informat Engn, Xian 710121, Shaanxi, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
D O I
10.1155/2018/6174830
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides a new, attractive paradigm for the effective sharing of storage and computing resources among global consumers. More and more enterprises have begun to enter the field of cloud computing and storing data in the cloud to facilitate the sharing data among users. However, in many cases, users may be concerned about data privacy, trust, and integrity. It is challenging to provide data sharing services without sacrificing these security requirements. In this paper, a data sharing scheme of reliable, secure, and privacy protection based on general access structure is introduced. The proposed scheme is not only effective and flexible, but also is capable of protecting privacy for the cloud owner, supporting data sharing under supervision, enabling accountability of users' decryption keys, and identifying cheaters if some users behave dishonestly. Security analysis and efficiency analysis demonstrate that our proposed scheme has better performance in computational costs compared with most related works. The scheme is versatile to be used in various environments. For example, it is particularly suitable to be employed to protect personal health data and medical diagnostic data in information medical environment.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03): : 401 - 414
  • [2] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    [J]. Journal of Computer Science & Technology, 2010, 25 (03) : 401 - 414
  • [3] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    [J]. Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [4] A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing
    Shen, Jian
    Yang, Huijie
    Vijayakumar, Pandi
    Kumar, Neeraj
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2198 - 2210
  • [5] Privacy-preserving data sharing scheme over cloud for social applications
    Lyu, Chen
    Sun, Shi-Feng
    Zhang, Yuanyuan
    Pande, Amit
    Lu, Haining
    Gu, Dawu
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 74 : 44 - 55
  • [6] Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing
    Dong, Xin
    Yu, Jiadi
    Luo, Yuan
    Chen, Yingying
    Xue, Guangtao
    Li, Minglu
    [J]. COMPUTERS & SECURITY, 2014, 42 : 151 - 164
  • [7] A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT
    Deng, Hua
    Qin, Zheng
    Sha, Letian
    Yin, Hui
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11601 - 11611
  • [8] Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing
    Xiong, Hu
    Zhang, Hao
    Sun, Jianfei
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2739 - 2750
  • [9] An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Huang, Kai
    Xu, Ming
    Fu, Shaojing
    Luo, Yuchuan
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (10) : 1891 - 1894
  • [10] POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing
    Tianpeng Deng
    Xuan Li
    Jinbo Xiong
    Ying Wu
    [J]. Multimedia Tools and Applications, 2022, 81 : 3693 - 3714