A User-Centric Data Secure Creation Scheme in Cloud Computing

被引:4
|
作者
Su Mang [1 ]
Li Fenghua [2 ]
Shi Guozhen [3 ]
Geng Kui [4 ]
Xiong Jinbo [2 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Jiangsu, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Dept Informat Secur, Beijing 100070, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
User-centric; ACC-PRE; Data creation; Master secret secure; CCA;
D O I
10.1049/cje.2016.07.017
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the use of the cloud computing technology, the ownership is separated from the administration of the data in cloud and the shared data might be migrated between different clouds, which would bring new challenges to data secure creation, especially for the data privacy protection. We propose a User-centric data secure creation scheme (UCDSC) for the security requirements of resource owners in cloud. In this scheme, a data owner first divides the users into different domains. The data owner encrypts data and defines different secure managing policies for the data according to domains. To encrypt the data in UCDSC, we present an algorithm based on Access control conditions proxy re-encryption (ACC-PRE), which is proved to be master secret secure and Chosen-ciphertext attack (CCA) secure in random oracle model. We give the application protocols and make the comparisons between some existing approaches and UCDSC.
引用
收藏
页码:753 / 760
页数:8
相关论文
共 50 条
  • [1] A User-Centric Data Secure Creation Scheme in Cloud Computing
    SU Mang
    LI Fenghua
    SHI Guozhen
    GENG Kui
    XIONG Jinbo
    Chinese Journal of Electronics, 2016, 25 (04) : 753 - 760
  • [2] A User-Centric Method for Data Privacy Protection in Cloud Computing
    Li, Xiaohui
    He, Jingsha
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 355 - +
  • [3] An User-Centric Billing Model for Cloud Computing
    Kumar, R. Anand
    Mittal, R. K.
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 132 - 138
  • [4] uCloud: a user-centric key management scheme for cloud data protection
    Kao, Yung-Wei
    Huang, Kuan-Ying
    Gu, Hui-Zhen
    Yuan, Shyan-Ming
    IET INFORMATION SECURITY, 2013, 7 (02) : 144 - 154
  • [5] Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud
    Will, Mark A.
    Ku, Ryan K. L.
    Witten, Ian H.
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 563 - 570
  • [6] Cloud Computing Privacy Issues and User-Centric Solution
    Lijo, V. P.
    Kalady, Saidalavi
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 448 - 456
  • [7] Mobile Cloud Computing Service Models: A User-Centric Approach
    Huang, Dijiang
    Xing, Tianyi
    Wu, Huijun
    IEEE NETWORK, 2013, 27 (05): : 6 - 11
  • [8] User-Centric Key Management Scheme for Personal Cloud Storage
    Yoo, SeongMin
    Park, PyungKoo
    Shin, JinSeop
    Oh, JinSeok
    Ryu, HoYong
    Ryou, JaeCheol
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,
  • [9] HUCDO: A Hybrid User-centric Data Outsourcing Scheme
    Huang, Ke
    Zhang, Xiaosong
    Wang, Xiaofen
    Mu, Yi
    Rezaeibagha, Fatemeh
    Xu, Guangquan
    Wang, Hao
    Zheng, Xi
    Yang, Guomin
    Xia, Qi
    Du, Xiaojiang
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2020, 4 (03)
  • [10] User-Centric Cloud Intermediation Services
    Nogueira, Luis
    Coelho, Jorge
    INTELLIGENT DISTRIBUTED COMPUTING VIII, 2015, 570 : 147 - 153