Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption

被引:0
|
作者
Zhu, Shuaishuai [1 ]
Han, Yiliang [1 ]
Wei, Yuechuan [1 ]
机构
[1] Engn Univ CAPF, Dept Elect, Network & Informat Secur Key Lab CAPF, Xian, Peoples R China
关键词
Cloud Computing; Outsourcing Data; Data Privacy; Database Management;
D O I
10.1109/INCoS.2015.29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In our IT society, cloud computing is clearly becoming one of the dominating infrastructures for enterprises as long as end users. As more cloud based services available to end users, their oceans of data are outsourced in the cloud as well. Without any special mechanisms, the data may be leaked to a third party for unauthorized use. Most presented works of cloud computing put these emphases on computing utility or new types of applications. But in the view of cloud users, such as traditional big companies, data in cloud computing systems is tend to be out of control and privacy fragile. So most of data they outsourced is less important. A mechanism to guarantee the ownership of data is required. In this paper, we analyzed a couple of recently presented scalable data management models to describe the storage patterns of data in cloud computing systems. Then we defined a new tree-based dataset management model to solve the storage and sharing problems in cloud computing. A couple of operation strategies including data encryption, data boundary maintenance, and data proof are extracted from the view of different entities in the cloud. The behaviors of different users are controlled by view management on the tree. Based on these strategies, a flexible data management mechanism is designed in the model to guarantee entity privacy, data availability and secure data sharing.
引用
收藏
页码:257 / 261
页数:5
相关论文
共 50 条
  • [41] A novel chaotic hash-based attribute-based encryption and decryption on cloud computing
    Tamma, Lakshmi Naga Divya
    Ahamad, Shaik Shakeel
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) : 1 - 19
  • [42] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    Soft Computing, 2017, 21 : 7325 - 7335
  • [43] Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing
    Yan, Hongyang
    Li, Xuan
    Du, Jiali
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 329 - 332
  • [44] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [45] A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
    Fu, Junsong
    Wang, Na
    IEEE ACCESS, 2019, 7 : 36218 - 36232
  • [46] Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing
    Zhu, Huijun
    Wang, Licheng
    Ahmad, Haseeb
    Niu, Xinxin
    IEEE ACCESS, 2017, 5 : 20428 - 20439
  • [47] Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
    Wang, Shulan
    Liang, Kaitai
    Liu, Joseph K.
    Chen, Jianyong
    Yu, Jianping
    Xie, Weixin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1661 - 1673
  • [48] Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2014, 57 (04): : 579 - 591
  • [49] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Li, Xiehua
    Wang, Yanlong
    Xu, Ming
    Cui, Yaping
    CHINA COMMUNICATIONS, 2018, 15 (02) : 138 - 152
  • [50] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Xiehua Li
    Yanlong Wang
    Ming Xu
    Yaping Cui
    中国通信, 2018, 15 (02) : 138 - 152