A robust cryptographic-based system for secure data sharing in cloud environments

被引:0
|
作者
Mahmoud, Ibrahim M. [1 ,3 ]
El-Din, Sherif H. Nour [2 ]
Elgohary, Rania [3 ]
Faheem, Hossam [3 ]
Mostafa, Mostafa G. M. [3 ]
机构
[1] Informat Technol Ind Dev Agcy, Giza 12577, Egypt
[2] Arab Acad Sci & Technol & Maritime Transportat, Cairo 1029, Egypt
[3] Ain Shams Univ, Fac Comp & Informat Sci, Cairo 11566, Egypt
关键词
cloud computing; digital identity; attribute-based encryption; proxy re-encryption; public key infrastructure; PROXY RE-ENCRYPTION;
D O I
10.1002/sec.1770
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, the usage of cloud storage services has been growing rapidly to share digital objects between data owner and consumers. However, such environment introduces many data privacy disclosure challenges. These challenges are maintaining data confidentiality, enforcing fine-grained data access control, applying efficient user revocation mechanism, and resisting collusion between system users. In addition, such environment imposes the support of system scalability and generic implementation features. Unfortunately, the proposal of a robust system that accomplishes all data privacy disclosure challenges and the mentioned features is still an open problem. In this paper, a robust cryptographic-based system that solves the stated problem is presented. In addition, the proposed system offers a novel architecture of data consumer digital identity. The presented digital identity solves scalability challenges faced by previous works without complicating data management for both data owner and consumer. Moreover, the proposed digital identity eliminates the need of online presence of data owner and consumer to exchange any information. Furthermore, the proposed system defends man-in-the-middle attack, ensures identity of participants, achieves non-repudiation, and maintains role separation between different participants. Finally, the proposed system implementation proofs the system validity to accomplish all the specified goals with acceptable performance. Copyright (C) 2017 John Wiley & Sons, Ltd.
引用
收藏
页码:6248 / 6265
页数:18
相关论文
共 50 条
  • [31] A Robust Owner-To-User Data Sharing Framework in Honest but Curious Cloud Environments
    Ibrahim, Ibrahim M.
    El-Din, Sherif H. Nour
    Elgohary, Rania
    Faheem, Hossam
    Mostafa, Mostafa G. M.
    [J]. 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 51 - 56
  • [32] Secure Data Storage in Distributed Cloud Environments
    Jordao, Renata
    Martins, Valerio Aymore
    Buiati, Fabio
    de Sousa Junior, Rafael Timoteo
    de Deus, Flavio Elias
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,
  • [33] Secure Data Storage Architecture on Cloud Environments
    Tran Thi Xuan Trang
    Maruyama, Katsuhisa
    [J]. ICSOFT-EA: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES - VOL. 1, 2016, : 39 - 47
  • [34] Secure Genomic Data Evaluation in Cloud Environments
    Bouti, Adil
    Keller, Joerg
    [J]. 2017 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2017,
  • [35] A Secure Architecture for Data Storage in the Cloud Environments
    Fu, Chuan
    Yang, Jun
    Liu, Zheli
    Jia, Chunfu
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 289 - 291
  • [36] CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data
    Mendes, Ricardo
    Oliveira, Tiago
    Cogo, Vinicius
    Neves, Nuno
    Bessani, Alysson
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1349 - 1361
  • [37] An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud
    Xu, Guowen
    Xu, Shengmin
    Ma, Jinhua
    Ning, Jianting
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5171 - 5185
  • [38] SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media Sharing
    Song, Mingyang
    Hua, Zhongyun
    Zheng, Yifeng
    Xiang, Tao
    Jia, Xiaohua
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4700 - 4715
  • [39] Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 62 - 73
  • [40] Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions
    Gupta, Ishu
    Singh, Ashutosh Kumar
    Lee, Chung-Nan
    Buyya, Rajkumar
    [J]. IEEE ACCESS, 2022, 10 : 71247 - 71277