Selective End-To-End Data-Sharing in the Cloud

被引:0
|
作者
Hoerandner, Felix [1 ]
Ramacher, Sebastian [2 ]
Roth, Simon [1 ]
机构
[1] Graz Univ Technol, Graz, Austria
[2] AIT Austrian Inst Technol, Vienna, Austria
来源
基金
欧盟地平线“2020”;
关键词
Data-sharing; End-to-end confidentiality; Proxy re-encryption; Redactable signatures; PROXY; ACCUMULATORS;
D O I
10.1007/978-3-030-36945-3_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud-based services enable easy-to-use data-sharing between multiple parties, and, therefore, have been widely adopted over the last decade. Storage services by large cloud providers such as Drop-box or Google Drive as well as federated solutions such as Nextcloud have amassed millions of users. Nevertheless, privacy challenges hamper the adoption of such services for sensitive data: Firstly, rather than exposing their private data to a cloud service, users desire end-to-end confidentiality of the shared files without sacrificing usability, e.g., without repeatedly encrypting when sharing the same data set with multiple receivers. Secondly, only being able to expose complete (authenticated) files may force users to expose overmuch information. The receivers, as well as the requirements, might be unknown at issue-time, and thus the issued data set does not exactly match those requirements. This mismatch can be bridged by enabling cloud services to selectively disclose only relevant parts of a file without breaking the parts' authenticity. While both challenges have been solved individually, it is not trivial to combine these solutions and maintain their security intentions. In this paper, we tackle this issue and introduce selective end-to-end data-sharing by combining ideas from proxy re-encryption and redactable signature schemes. Proxy re-encryption provides us with the basis for end-to-end encrypted data-sharing, while redactable signatures enable to redact parts and selectively disclose only the remaining still authenticated parts. We overcome the issues encountered when naively combining these two concepts, introduce a security model, and present a modular instantiation together with implementations based on a selection of various building blocks. We conclude with an extensive performance evaluation of our instantiation.
引用
收藏
页码:175 / 195
页数:21
相关论文
共 50 条
  • [1] Selective end-to-end data-sharing in the cloud
    Felix Hörandner
    Sebastian Ramacher
    Simon Roth
    [J]. Journal of Banking and Financial Technology, 2020, 4 (1): : 139 - 157
  • [2] CloudDRN: A Lightweight, End-to-End System for Sharing Distributed Research Data in the Cloud
    Humphrey, Marty
    Steele, Jacob
    Kim, In Kee
    Kahn, Michael G.
    Bondy, Jessica
    Ames, Michael
    [J]. 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON E-SCIENCE (E-SCIENCE), 2013, : 254 - 261
  • [3] MOZAIK: An End-to-End Secure Data Sharing Platform
    Abidin, Aysajan
    Marquet, Enzo
    Moeyersons, Jerico
    Limani, Xhulio
    Pohle, Erik
    Van Kenhove, Michiel
    Marquez-Barja, Johann M.
    Slamnik-Krijestorac, Nina
    Volckaert, Bruno
    [J]. PROCEEDINGS OF THE 2ND ACM DATA ECONOMY WORKSHOP, DEC 2023, 2023, : 34 - 40
  • [4] Improved End-to-End Data Security Approach for Cloud Computing
    Ghosh, Soumalya
    Verma, Shiv Kumar
    Ghosh, Uttam
    Al-Numay, Mohammed
    [J]. SUSTAINABILITY, 2023, 15 (22)
  • [5] End-to-End Availability of Cloud Services
    Netes, Victor
    [J]. PROCEEDINGS OF THE 2018 22ND CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2018, : 198 - 203
  • [6] End-to-End Encrypted Cloud Storage
    Backendal, Matilda
    Haller, Miro
    Paterson, Kenny
    [J]. IEEE SECURITY & PRIVACY, 2024, 22 (02) : 69 - 74
  • [7] Cloud Challenge: Secure End-to-End Processing of Smart Metering Data
    Brito, Andrey
    Fetzer, Christof
    Kopsell, Stefan
    Pietzuch, Peter
    Pasin, Marcelo
    Felber, Pascal
    Fonseca, Keiko
    Rosa, Marcelo
    Gomes-, Luiz, Jr.
    Riella, Rodrigo
    Prado, Charles
    da Costa Carmo, Luiz F. C.
    Lucani, Daniel E.
    Sipos, Marton
    Nagy, Laszlo
    Feher, Marcell
    [J]. 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING COMPANION (UCC COMPANION), 2018, : 36 - 42
  • [8] Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs
    Alghamdi, Wael Y.
    Wu, Hui
    Kanhere, Salil S.
    [J]. 2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [9] A survey on end-to-end point cloud learning
    Tang, Xikai
    Huang, Fangzheng
    Li, Chao
    Ban, Dayan
    [J]. IET IMAGE PROCESSING, 2023, 17 (05) : 1307 - 1321
  • [10] CCAG: End-to-End Point Cloud Registration
    Wang, Yong
    Zhou, Pengbo
    Geng, Guohua
    An, Li
    Liu, Yangyang
    [J]. IEEE ROBOTICS AND AUTOMATION LETTERS, 2024, 9 (01) : 435 - 442