File sharing scheme for multi-user in cloud environment

被引:0
作者
Wang, Zhonghua [1 ]
Han, Zhen [1 ]
Liu, Jiqiang [1 ]
机构
[1] School of Computer and Information Technology, Beijing Jiaotong University, Beijing
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2014年 / 51卷 / 12期
关键词
Cloud computing; File sharing; Multi-user; Proxy re-encryption; Secure cloud storage;
D O I
10.7544/issn1000-1239.2014.20131178
中图分类号
学科分类号
摘要
With the rapid development of cloud storage, more and more people prefer to transfer personal files and data from local to cloud and share them with each other by cloud storage service. Nevertheless, each user has different access privileges on account of different identities, roles, etc. Given the different access privileges among the multi-user sharing the same file in cloud environment, an efficient file sharing scheme for multi-user is presented. Based on Elgamal cryptographic system and proxy re-encryption, multi-user access to different contents of the same file encrypted once by file owner is achieved in the proposed scheme. Compared with previous proposals, the scheme has the following advantages: the computation of the shared file encrypted by file owner is only proportional to the exponentiations of the amount of file blocks, regardless of bilinear pairings. Besides, users access to different contents of the same file by exponentiations with linear times regardless of bilinear pairings. Furthermore, ciphertext space for storage has no increments. Further analysis shows that our scheme adapts to the characteristics of cloud computing, which means cloud service providers provide fast computation and huge storage for thin clients. ©, 2014, Science Press. All right reserved.
引用
收藏
页码:2614 / 2622
页数:8
相关论文
共 18 条
  • [1] Xu P., Jin H., Zou D., Cryptographic data security and privacy in cloud storage, Communications of the China Computer Fedaration, 8, 7, pp. 22-28, (2012)
  • [2] Yu S., Wang C., Ren K., Et al., Achieving secure, scalable, and fine-grained data access control in cloud computing, Proc of IEEE Conf on Computer Communications (INFOCOM'10), pp. 15-19, (2010)
  • [3] Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proc of ACM Conf on Computer and Communications Security (CCS'06), pp. 89-98, (2006)
  • [4] Blaze M., Bleumer G., Strauss M., Divertible protocols and atomic proxy cryptography, LNCS 1403: Proc of Int Conf on the Theory and Application of Cryptographic Techniques, pp. 127-144, (1998)
  • [5] Liu Q., Wang G., Wu J., Efficient sharing of secure cloud storage services, Proc of the 10th IEEE Int Conf on Computer and Information Technology, pp. 922-929, (2010)
  • [6] Lu Z., Zhang M., Feng D., Cryptographic access control scheme for cloud storage, Journal of Frontiers of Computer Science and Technology, 5, 9, pp. 835-845, (2011)
  • [7] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, Proc of the 2007 IEEE Symp on Security and Privacy, pp. 321-334, (2007)
  • [8] Cheng Y., Wang Z., Ma J., Et al., Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage, Journal of Zhejiang University-SCIENCE C (Computers & Electronics), 14, 2, pp. 85-97, (2013)
  • [9] Samanthula B.K., Howser G., Elmehdwi Y., Et al., An efficient and secure data sharing framework using homomorphic encryption in the cloud, Proc of the 1st Int Workshop on Cloud Intelligence (Cloud-I'12), (2012)
  • [10] Han J., Susilo W., Mu Y., Identity-based secure distributed data storage schemes, IEEE Trans on Computers, 63, 4, pp. 941-953, (2014)