Index Generation and Secure Multi-User Access Control over an Encrypted Cloud Data

被引:9
|
作者
Raghavendra, S. [1 ]
Meghana, K. [1 ]
Doddabasappa, P. A. [1 ]
Geeta, C. M. [1 ]
Buyya, Rajkumar [2 ]
Venugopal, K. R. [1 ]
Iyengar, S. S. [3 ]
Patnaik, L. M. [4 ]
机构
[1] Univ Visvesvaraya, Coll Engn, Bangalore, Karnataka, India
[2] Univ Melbourne, Melbourne, Vic 3010, Australia
[3] Florida Int Univ, Miami, FL 33199 USA
[4] Indian Inst Sci Campus, Natl Inst Adv Studies, Bangalore, Karnataka, India
关键词
Access Control; Cloud Computing; Key Generation; Keyword Search; Storage and Retrieval;
D O I
10.1016/j.procs.2016.06.062
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing provides economical and effective solution for sharing data among cloud users with low maintenance cost. The security of data and identity confidentiality while sharing data in multi-owner way cannot be assured by the Cloud Service Providers (CSP's). The Cloud Service Providers are reliable but curious to know the recurrent membership changes in the cloud. In this paper, we propose a secure multi-owner data sharing for dynamic group in the cloud with RSA Chinese Remainder Theorem (RSA-CRT) encryption technique and substring index generation method. RSA-CRT efficiently manages revocation list, key management, with reduced storage and computational overhead. The substring Index generation algorithm reduces the storage space compared to wild card fuzzy alogorithm(1). (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:293 / 300
页数:8
相关论文
共 50 条
  • [1] Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management
    Fateh Boucenna
    Omar Nouali
    Samir Kechid
    M. Tahar Kechadi
    Journal of Computer Science and Technology, 2019, 34 : 133 - 154
  • [2] Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management
    Boucenna, Fateh
    Nouali, Omar
    Kechid, Samir
    Kechadi, M. Tahar
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (01) : 133 - 154
  • [3] Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup
    Strizhov, Mikhail
    Ray, Indrajit
    TRANSACTIONS ON DATA PRIVACY, 2016, 9 (02) : 131 - 159
  • [5] Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage
    Changhee Hahn
    Hyung June Shin
    Hyunsoo Kwon
    Junbeom Hur
    Wireless Personal Communications, 2019, 107 : 1337 - 1353
  • [6] Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage
    Hahn, Changhee
    Shin, Hyung June
    Kwon, Hyunsoo
    Hur, Junbeom
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (03) : 1337 - 1353
  • [7] EFFICIENT MULTI-USER KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING
    Li, Jin
    Chen, Xiaofeng
    COMPUTING AND INFORMATICS, 2013, 32 (04) : 723 - 738
  • [8] Design and Implementation of Multi-user Secure Indices for Encrypted Cloud Storage
    Lin, Mao-Pang
    Hong, Wei-Chih
    Chen, Chih-Hung
    Cheng, Chen-Mou
    2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 177 - 184
  • [9] Secure k-NN as a Service Over Encrypted Data in Multi-User Setting
    Singh, Gagandeep
    Kaul, Akshar
    Mehta, Sameep
    PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 154 - 161
  • [10] SeUpdate: Secure Encrypted Data Update for Multi-User Environments
    Wang, Jiabei
    Zhang, Rui
    Li, Jianhao
    Xiao, Yuting
    Ma, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3592 - 3606