A robust cryptographic-based system for secure data sharing in cloud environments

被引:0
|
作者
Mahmoud, Ibrahim M. [1 ,3 ]
El-Din, Sherif H. Nour [2 ]
Elgohary, Rania [3 ]
Faheem, Hossam [3 ]
Mostafa, Mostafa G. M. [3 ]
机构
[1] Informat Technol Ind Dev Agcy, Giza 12577, Egypt
[2] Arab Acad Sci & Technol & Maritime Transportat, Cairo 1029, Egypt
[3] Ain Shams Univ, Fac Comp & Informat Sci, Cairo 11566, Egypt
关键词
cloud computing; digital identity; attribute-based encryption; proxy re-encryption; public key infrastructure; PROXY RE-ENCRYPTION;
D O I
10.1002/sec.1770
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, the usage of cloud storage services has been growing rapidly to share digital objects between data owner and consumers. However, such environment introduces many data privacy disclosure challenges. These challenges are maintaining data confidentiality, enforcing fine-grained data access control, applying efficient user revocation mechanism, and resisting collusion between system users. In addition, such environment imposes the support of system scalability and generic implementation features. Unfortunately, the proposal of a robust system that accomplishes all data privacy disclosure challenges and the mentioned features is still an open problem. In this paper, a robust cryptographic-based system that solves the stated problem is presented. In addition, the proposed system offers a novel architecture of data consumer digital identity. The presented digital identity solves scalability challenges faced by previous works without complicating data management for both data owner and consumer. Moreover, the proposed digital identity eliminates the need of online presence of data owner and consumer to exchange any information. Furthermore, the proposed system defends man-in-the-middle attack, ensures identity of participants, achieves non-repudiation, and maintains role separation between different participants. Finally, the proposed system implementation proofs the system validity to accomplish all the specified goals with acceptable performance. Copyright (C) 2017 John Wiley & Sons, Ltd.
引用
收藏
页码:6248 / 6265
页数:18
相关论文
共 50 条
  • [21] Efficient Cryptographic Protocol Design for Secure Sharing of Personal Health Records in the Cloud
    Sukte, Chudaman Devidasrao
    Mark, Emmanuel
    Deshmukh, Ratnadeep R.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2022, 15 (01)
  • [22] An Efficient Paillier Cryptographic Technique for Secure Data Storage on the Cloud
    Pallavi
    Joshi, Sandeep
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 145 - 149
  • [23] Secure cloud services - extended cryptographic model of data storage
    Grocholewska-Czurylo, Anna
    Retinger, Marek
    [J]. PRZEGLAD ELEKTROTECHNICZNY, 2018, 94 (03): : 162 - 167
  • [24] A Novel Cryptographic and Steganographic Approach for Secure Cloud Data Migration
    Dhamija, Ankit
    Dhaka, Vijay
    [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 346 - 351
  • [25] Addressing Techniques for Secure Data Sharing in Cloud
    Bhagat, Arti
    Rathee, Nisha
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 499 - 503
  • [26] Secure Sharing of Health Data Over Cloud
    Alamri, Fahad Saeed
    Lee, Ki Dong
    [J]. 2015 5TH NATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGY: TOWARDS NEW SMART WORLD (NSITNSW), 2015,
  • [27] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    Hema, V. Sri Vigna
    Kesavan, Ramesh
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (02) : 1021 - 1035
  • [28] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    V. Sri Vigna Hema
    Ramesh Kesavan
    [J]. Wireless Personal Communications, 2019, 108 : 1021 - 1035
  • [29] SeShare: Secure cloud data sharing based on blockchain and public auditing
    Huang, Longxia
    Zhang, Gongxuan
    Yu, Shui
    Fu, Anmin
    Yearwood, John
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (22):
  • [30] A highly efficient and secure electronic cash system based on secure sharing in cloud environment
    Chang, Chin-Chen
    Chen, Wei-Yi
    Chang, Shih-Chang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2476 - 2483