User-Controlled Encrypted Data Sharing Model in Cloud Storage

被引:0
|
作者
Wu, Yuezhong [1 ,2 ]
Chen, Shuhong [3 ,5 ]
Wang, Guojun [3 ]
Li, Changyun [2 ,4 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Hunan Univ Technol, Sch Comp Sci, Zhuzhou 412007, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
[4] Hunan Prov Key Lab, Intelligent Informat Percept & Proc Technol, Zhuzhou 412007, Peoples R China
[5] Hunan Inst Engn, Sch Comp & Commun, Xiangtan 411104, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Cloud storage; Data confidentiality; Ciphertext access control; DATA ACCESS; PROOFS;
D O I
10.1007/978-3-319-73317-3_2
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud storage services provide us convenience for storing and sharing vast amounts of data by its low cost, high scalability and other advantages while it brings out security risks as well. A user-controlled encrypted data sharing model in cloud storage (UESMCS) is put forward hereby. It pre-processes user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Thus, the reliability and safety for data sharing can be achieved provided the trustworthy third party being brought in. The experimental results show that UESMCS ensures data security in cloud storage services platform and enhances the operational performance for data sharing. The security sharing mechanism perfectly fits the actual cloud storage environment.
引用
收藏
页码:12 / 20
页数:9
相关论文
共 50 条
  • [1] A new user-controlled and efficient encrypted data sharing model in cloud storage
    Wu Y.
    Chen W.
    Chen S.
    Wang G.
    Li C.
    Recent Patents on Engineering, 2019, 13 (04) : 356 - 363
  • [2] A Cloud Design for User-controlled Storage and Processing of Sensor Data
    Hummen, Rene
    Henze, Martin
    Catrein, Daniel
    Wehrle, Klaus
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [3] KYChain: User-Controlled KYC Data Sharing and Certification
    Dragan, Constantin Catalin
    Manulis, Mark
    PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 301 - 307
  • [4] User-Controlled Identity Provisioning for Secure Account Sharing
    Liu, Dongxi
    Zic, John
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 644 - 651
  • [5] Anonymous User Authentication with Secured Storage and Sharing Of Data on Cloud
    Karad, Manisha D.
    Vaidya, Milind B.
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 201 - 205
  • [6] Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management
    Hulsebosch, Bob
    de Groote, Robert
    Snijders, Martin
    SCALABILITY OF NETWORKS AND SERVICES, PROCEEDINGS, 2009, 5637 : 1 - 14
  • [7] An automaton model of user-controlled navigation on the web
    Lodaya, K
    Ramanujam, R
    IMPLEMENTATION AND APPLICATION OF AUTOMATA, 2001, 2088 : 208 - 216
  • [8] Encrypted Data Deduplication in Cloud Storage
    Fan, Chun-I
    Huang, Shi-Yuan
    Hsu, Wen-Che
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 18 - 25
  • [9] User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public Blockchain
    Zhou, Xiaohu
    Jesus, Vitor
    Wang, Yonghao
    Josephs, Mark
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 87 - 96
  • [10] Automated federation of distributed resources into user-controlled cloud environments
    Mosch, Marc
    Schweizer, Hartmut
    Gross, Stephan
    Schill, Alexander
    2012 IEEE/ACM FIFTH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2012), 2012, : 321 - 326