A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing

被引:0
|
作者
Wang, Xin [1 ,2 ,3 ]
Yang, Bo [1 ,3 ]
Xia, Zhe [4 ]
Zhao, Yanqi [1 ]
Yu, Huifang [5 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Shaanxi, Peoples R China
[2] Shaanxi Univ Sci & Technol, Coll Elect & Informat Engn, Xian 710021, Shaanxi, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Wuhan Univ Technol, Sch Comp Sci & Technol, Wuhan 430070, Hubei, Peoples R China
[5] Xian Univ Posts & Telecommun, Sch Commun & Informat Engn, Xian 710121, Shaanxi, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
D O I
10.1155/2018/6174830
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides a new, attractive paradigm for the effective sharing of storage and computing resources among global consumers. More and more enterprises have begun to enter the field of cloud computing and storing data in the cloud to facilitate the sharing data among users. However, in many cases, users may be concerned about data privacy, trust, and integrity. It is challenging to provide data sharing services without sacrificing these security requirements. In this paper, a data sharing scheme of reliable, secure, and privacy protection based on general access structure is introduced. The proposed scheme is not only effective and flexible, but also is capable of protecting privacy for the cloud owner, supporting data sharing under supervision, enabling accountability of users' decryption keys, and identifying cheaters if some users behave dishonestly. Security analysis and efficiency analysis demonstrate that our proposed scheme has better performance in computational costs compared with most related works. The scheme is versatile to be used in various environments. For example, it is particularly suitable to be employed to protect personal health data and medical diagnostic data in information medical environment.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] A privacy-preserving sensory data sharing scheme in Internet of Vehicles
    Kong, Qinglei
    Lu, Rongxing
    Ma, Maode
    Bao, Haiyong
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 : 644 - 655
  • [22] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [23] A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs
    Yang, Huijie
    Shen, Jian
    Zhou, Tianqi
    Ji, Sai
    Vijayakumar, Pandi
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (02)
  • [24] Hybrid Solution for Privacy-Preserving Data Mining on the Cloud Computing
    Osman, Huda
    Maarof, Mohd Aizaini
    Siraj, Maheyzah Md
    [J]. EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS: DATA SCIENCE, INTELLIGENT INFORMATION SYSTEMS AND SMART COMPUTING, 2020, 1073 : 748 - 758
  • [25] Efficient Privacy-Preserving Spatial Data Query in Cloud Computing
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Wei, Linfeng
    Liu, Zhiquan
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (01) : 122 - 136
  • [26] Privacy-preserving multikey computing framework for encrypted data in the cloud
    Zhang, Jun
    Jiang, Zoe L.
    Li, Ping
    Yiu, Siu Ming
    [J]. INFORMATION SCIENCES, 2021, 575 : 217 - 230
  • [27] Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
    Alkhojandi, Naelah
    Miri, Ali
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 35 - 48
  • [28] Review on privacy-preserving data comparison protocols in cloud computing
    Jiang, Leqi
    Xia, Zhihua
    Sun, Xingming
    [J]. AI AND CLOUD COMPUTING, 2021, 120 : 81 - 119
  • [29] On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing
    Xiong, Lizhi
    Shi, Yunqing
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (03): : 523 - 539
  • [30] Anonymous Privacy-Preserving Scheme for Big Data Over the Cloud
    Al-Odat, Zeyad A.
    Khan, Samee U.
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5711 - 5717