A robust cryptographic-based system for secure data sharing in cloud environments

被引:0
|
作者
Mahmoud, Ibrahim M. [1 ,3 ]
El-Din, Sherif H. Nour [2 ]
Elgohary, Rania [3 ]
Faheem, Hossam [3 ]
Mostafa, Mostafa G. M. [3 ]
机构
[1] Informat Technol Ind Dev Agcy, Giza 12577, Egypt
[2] Arab Acad Sci & Technol & Maritime Transportat, Cairo 1029, Egypt
[3] Ain Shams Univ, Fac Comp & Informat Sci, Cairo 11566, Egypt
关键词
cloud computing; digital identity; attribute-based encryption; proxy re-encryption; public key infrastructure; PROXY RE-ENCRYPTION;
D O I
10.1002/sec.1770
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, the usage of cloud storage services has been growing rapidly to share digital objects between data owner and consumers. However, such environment introduces many data privacy disclosure challenges. These challenges are maintaining data confidentiality, enforcing fine-grained data access control, applying efficient user revocation mechanism, and resisting collusion between system users. In addition, such environment imposes the support of system scalability and generic implementation features. Unfortunately, the proposal of a robust system that accomplishes all data privacy disclosure challenges and the mentioned features is still an open problem. In this paper, a robust cryptographic-based system that solves the stated problem is presented. In addition, the proposed system offers a novel architecture of data consumer digital identity. The presented digital identity solves scalability challenges faced by previous works without complicating data management for both data owner and consumer. Moreover, the proposed digital identity eliminates the need of online presence of data owner and consumer to exchange any information. Furthermore, the proposed system defends man-in-the-middle attack, ensures identity of participants, achieves non-repudiation, and maintains role separation between different participants. Finally, the proposed system implementation proofs the system validity to accomplish all the specified goals with acceptable performance. Copyright (C) 2017 John Wiley & Sons, Ltd.
引用
收藏
页码:6248 / 6265
页数:18
相关论文
共 50 条
  • [1] Secure Data in the Cloud with a Robust Hybrid Cryptographic Approach
    Ismail, Ghada Yousif
    Alhayali, Shaymaa
    Kareem, Shahab Wahhab
    Hussain, Zozan Saadallah
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (02)
  • [2] ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing
    Loruenser, Thomas
    Happe, Andreas
    Slamanig, Daniel
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 371 - 378
  • [4] A secure and auditable cryptographic-based e-voting scheme
    Mursi, Mona F. M.
    Assassa, Ghazy M. R.
    AbdelHafez, Ahmed A.
    AboSamra, Kareem M.
    [J]. 2015 SECOND INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI), 2015, : 253 - 262
  • [5] Secure File Sharing Using Cryptographic Techniques in Cloud
    Malarvizhi, M.
    Sujana, J. Angela Jennifa
    Revathi, T.
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [6] Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments
    Shunmuganathan, Saraswathi
    Kannan, Sridharan
    Rao, T. V. Madhusudhana
    Ambika, K.
    Jayasankar, T.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (02): : 785 - 801
  • [7] Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (3-4) : 298 - 322
  • [8] Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing
    Eltayieb, Nabeil
    Elhabob, Rashad
    Abdelgader, Abdeldime M. S.
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
  • [9] Cryptographic Tools Allow for Secure Sharing of Confidential Data
    Hampton, Tracy
    [J]. CIRCULATION, 2019, 139 (06) : 829 - 829
  • [10] An SKP-ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments
    Hwang, Yong-Woon
    Kim, Su-Hyun
    Seo, Daehee
    Lee, Im-Yeong
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022