|Table of Contents|

Data sharing scheme supporting fast key updatingin the encrypted database(PDF)


Research Field:
Publishing date:


Data sharing scheme supporting fast key updatingin the encrypted database
Yan Xixi1Hu Qianwei1Li Zichen2Tang Yongli1
1.School of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454003,China; 2.Beijing Institute of Graphic Communication,Beijing 102600,China
encrypted database attribute-based encryption data share data updating
Attribute-based encryption(ABE)is an optimal choice for one-to-many data sharing in the cloud environment,and is not very efficient when data owner updates the content key dynamically.In order to solve this problem,data sharing scheme supporting fast key updating in the encrypted database is proposed.In the scheme,the data owner encrypts the data key with attribute-based encryption mechanism.In addition,re-encryption mechanism is used to support the rapid updating of the data key.In this way,it can reduce the user and server workload and improve system security.The scheme is secure against chosen plaintext attack under the decision bilinear Diffie-Hellman(DBDH)assumption in the standard model.Compared with other schemes,the length of the attribute keys and ciphertext are optimized in the scheme.The cost of data sharing and accessing is reduced,which is more suitable for the practical application of cloud environment.


[1] Wang Weichao,Li Zhiwei,Owens R,et al.Secure and efficient access to outsourced data[C]//Proceedings of ACM Cloud Computing Security Workshop.New York,USA:ACM Press,2009:55-66.
[2]Vimercati S D C D,Foresti S,Jajodia S,et al.Preserving confidentiality of security policies in data outsourcing[C]//Proceedings of ACM Workshop on Privacy in the Electronic Society.USA:ACM Press,2008:75-84.
[3]Vijayalakshmi T,Suresh N.Secure multi-owner data sharing for dynamic groups in the cloud[J].IEEE Transactions on Parallel & Distributed Systems,2013,24(6):1182-1191.
[4]Varun I,Mohan B V.An efficient secure multi owner data sharing for dynamic groups in cloud computing[J].International Journal of Computer Science & Mobile Computing,2014,3(6):730-734.
[5]Li Jingwei,Li Jin,Liu Zheli,et al.Enabling efficient and secure data sharing in cloud computing[J].Concurrency and Computation:Practice and Expe-rience,2014,26(5):1052-1066.
[6]Aarthi D,Indira N.Enabling efficient and protected sharing of data in cloud computing[C]//Proceedings of International Conference on Information Commu-nication and Embedded Systems.Piscataway,USA:IEEE Press,2016:1-5.
[7]Ibtissam E,Youness T,Abdelhamid B.Securing shared data in cloud computing by using cryptographic schemes[J].International Journal of Computer Applications,2016,146(14):28-32.
[8]Abhishek C,Sahadev G,Richa K,et al.Secure sharing of data in cloud computing with secret sharing algorithm[J].International Journal of Emerging Trend in Engineering and Basic Sciences(IJEEBS),2015,2(1):665-671.
[9]Gentry C,Halevi S.Implementing Gentry’s fully-homomorphic encryption scheme[C]//Proceedings of International Conference on the Theory and Appli-cations of Cryptographic Techniques.Berlin:Springer-Verlag,2011:129-148.
[10]Samanthula B K,Howser G,Elmehdwi Y,et al.An efficient and secure data sharing framework using homomorphic encryption in the cloud[C]//Proceedings of the 1st International Workshop on Cloud Inte-lligence.New York,USA:ACM Press,2012:1-8.
[11]Sahai A,Waters B.Fuzzy identity-based encryption[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques.Berlin:Springer-Verlag,2005:457-473.
[12]Ibraimi L,Tang Q,Hartel P,et al.Efficient and provable secure ciphertext-policy attribute-based encryption schemes[M].Information Security Practice and Experience,Berlin:Springer Berlin Heidelberg,2009:1-12.
[13]Dong Xin,Yu Jiadi,Luo Yuan,et al.Achieving an effective,scalable and privacy-preserving data sharing service in cloud computing[J].Computers & Security,2013,42(5):151-164.
[14]Huang Qinlong,Ma Zhaofeng,Yang Yixian,et al.EABDS:Attribute-based secure data sharing with efficient revocation in cloud computing[J].Chinese Journal of Electronics,2015,24(4):862-868.
Zhang Xing,Wen Zilong,Shen Qingni,et al.Accountable attribute-based encryption scheme without key escrow[J].Journal of Computer Research and Development,2015,52(10):2293-2303.
[16]Fu Jingyi,Huang Qinlong,Ma Zhaofeng,et al.Secure personal data sharing in cloud computing using attribute-based broadcast encryption[J].Journal of China Universities of Posts & Telecommunications,2014,21(6):45-51.
Zhang Lina,Yang Bo,Zhou Yanwei,et al.Compact Attribute-based broadcast encryption scheme for general circuits with arbitrary depthp[J/OL].Chinese Journal of Computers,2016,39:Online Publishing No.180.
[18]He H,Li R,Dong X,et al.Secure,efficient and fine-grained data access control mechanism for p2p storage cloud[J].IEEE Transactions on Cloud Computing,2014,2(4):471-484.
[19]Lu Yang.Efficient certificate-based proxy re-encryption scheme for data sharing in public clouds[J].Ksii Transactions on Internet & Information Systems,2015,9(7):2703-2718.
Yao Wenbin,Han Si,Li Xiaoyong.Security sharing scheme for encrypted data in cloud storage[J].Journal on Communications,2015,36(10):1-8.
[21]Waters B.Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]//International Workshop on Public Key Crypto-graphy 2011.Berlin:Springer-Verlay,2011:53-70.


Last Update: 2017-08-31