|Table of Contents|

Data sharing scheme supporting fast key updatingin the encrypted database(PDF)

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2017年04期
Page:
412-
Research Field:
Publishing date:

Info

Title:
Data sharing scheme supporting fast key updatingin the encrypted database
Author(s):
Yan Xixi1Hu Qianwei1Li Zichen2Tang Yongli1
1.School of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454003,China; 2.Beijing Institute of Graphic Communication,Beijing 102600,China
Keywords:
encrypted database attribute-based encryption data share data updating
PACS:
TP309
DOI:
10.14177/j.cnki.32-1397n.2017.41.04.003
Abstract:
Attribute-based encryption(ABE)is an optimal choice for one-to-many data sharing in the cloud environment,and is not very efficient when data owner updates the content key dynamically.In order to solve this problem,data sharing scheme supporting fast key updating in the encrypted database is proposed.In the scheme,the data owner encrypts the data key with attribute-based encryption mechanism.In addition,re-encryption mechanism is used to support the rapid updating of the data key.In this way,it can reduce the user and server workload and improve system security.The scheme is secure against chosen plaintext attack under the decision bilinear Diffie-Hellman(DBDH)assumption in the standard model.Compared with other schemes,the length of the attribute keys and ciphertext are optimized in the scheme.The cost of data sharing and accessing is reduced,which is more suitable for the practical application of cloud environment.

References:

[1] Wang Weichao,Li Zhiwei,Owens R,et al.Secure and efficient access to outsourced data[C]//Proceedings of ACM Cloud Computing Security Workshop.New York,USA:ACM Press,2009:55-66.
[2]Vimercati S D C D,Foresti S,Jajodia S,et al.Preserving confidentiality of security policies in data outsourcing[C]//Proceedings of ACM Workshop on Privacy in the Electronic Society.USA:ACM Press,2008:75-84.
[3]Vijayalakshmi T,Suresh N.Secure multi-owner data sharing for dynamic groups in the cloud[J].IEEE Transactions on Parallel & Distributed Systems,2013,24(6):1182-1191.
[4]Varun I,Mohan B V.An efficient secure multi owner data sharing for dynamic groups in cloud computing[J].International Journal of Computer Science & Mobile Computing,2014,3(6):730-734.
[5]Li Jingwei,Li Jin,Liu Zheli,et al.Enabling efficient and secure data sharing in cloud computing[J].Concurrency and Computation:Practice and Expe-rience,2014,26(5):1052-1066.
[6]Aarthi D,Indira N.Enabling efficient and protected sharing of data in cloud computing[C]//Proceedings of International Conference on Information Commu-nication and Embedded Systems.Piscataway,USA:IEEE Press,2016:1-5.
[7]Ibtissam E,Youness T,Abdelhamid B.Securing shared data in cloud computing by using cryptographic schemes[J].International Journal of Computer Applications,2016,146(14):28-32.
[8]Abhishek C,Sahadev G,Richa K,et al.Secure sharing of data in cloud computing with secret sharing algorithm[J].International Journal of Emerging Trend in Engineering and Basic Sciences(IJEEBS),2015,2(1):665-671.
[9]Gentry C,Halevi S.Implementing Gentry’s fully-homomorphic encryption scheme[C]//Proceedings of International Conference on the Theory and Appli-cations of Cryptographic Techniques.Berlin:Springer-Verlag,2011:129-148.
[10]Samanthula B K,Howser G,Elmehdwi Y,et al.An efficient and secure data sharing framework using homomorphic encryption in the cloud[C]//Proceedings of the 1st International Workshop on Cloud Inte-lligence.New York,USA:ACM Press,2012:1-8.
[11]Sahai A,Waters B.Fuzzy identity-based encryption[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques.Berlin:Springer-Verlag,2005:457-473.
[12]Ibraimi L,Tang Q,Hartel P,et al.Efficient and provable secure ciphertext-policy attribute-based encryption schemes[M].Information Security Practice and Experience,Berlin:Springer Berlin Heidelberg,2009:1-12.
[13]Dong Xin,Yu Jiadi,Luo Yuan,et al.Achieving an effective,scalable and privacy-preserving data sharing service in cloud computing[J].Computers & Security,2013,42(5):151-164.
[14]Huang Qinlong,Ma Zhaofeng,Yang Yixian,et al.EABDS:Attribute-based secure data sharing with efficient revocation in cloud computing[J].Chinese Journal of Electronics,2015,24(4):862-868.
[15]张星,文子龙,沈晴霓,等.可追责并解决密钥托管问题的属性基加密方案[J].计算机研究与发展,2015,52(10):2293-2303.
Zhang Xing,Wen Zilong,Shen Qingni,et al.Accountable attribute-based encryption scheme without key escrow[J].Journal of Computer Research and Development,2015,52(10):2293-2303.
[16]Fu Jingyi,Huang Qinlong,Ma Zhaofeng,et al.Secure personal data sharing in cloud computing using attribute-based broadcast encryption[J].Journal of China Universities of Posts & Telecommunications,2014,21(6):45-51.
[17]张丽娜,杨波,周彦伟,等.适于任意深度电路结构的紧致属性基广播加密方案[J/OL].计算机学报,2016,39:在线出版号No.180.
Zhang Lina,Yang Bo,Zhou Yanwei,et al.Compact Attribute-based broadcast encryption scheme for general circuits with arbitrary depthp[J/OL].Chinese Journal of Computers,2016,39:Online Publishing No.180.
[18]He H,Li R,Dong X,et al.Secure,efficient and fine-grained data access control mechanism for p2p storage cloud[J].IEEE Transactions on Cloud Computing,2014,2(4):471-484.
[19]Lu Yang.Efficient certificate-based proxy re-encryption scheme for data sharing in public clouds[J].Ksii Transactions on Internet & Information Systems,2015,9(7):2703-2718.
[20]姚文斌,韩司,李小勇.云存储环境下的密文安全共享机制[J].通信学报,2015,36(10):1-8.
Yao Wenbin,Han Si,Li Xiaoyong.Security sharing scheme for encrypted data in cloud storage[J].Journal on Communications,2015,36(10):1-8.
[21]Waters B.Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]//International Workshop on Public Key Crypto-graphy 2011.Berlin:Springer-Verlay,2011:53-70.

Memo

Memo:
-
Last Update: 2017-08-31