A User-Centric Data Secure Creation Scheme in Cloud Computing

被引:4
|
作者
Su Mang [1 ]
Li Fenghua [2 ]
Shi Guozhen [3 ]
Geng Kui [4 ]
Xiong Jinbo [2 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Jiangsu, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Dept Informat Secur, Beijing 100070, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
User-centric; ACC-PRE; Data creation; Master secret secure; CCA;
D O I
10.1049/cje.2016.07.017
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the use of the cloud computing technology, the ownership is separated from the administration of the data in cloud and the shared data might be migrated between different clouds, which would bring new challenges to data secure creation, especially for the data privacy protection. We propose a User-centric data secure creation scheme (UCDSC) for the security requirements of resource owners in cloud. In this scheme, a data owner first divides the users into different domains. The data owner encrypts data and defines different secure managing policies for the data according to domains. To encrypt the data in UCDSC, we present an algorithm based on Access control conditions proxy re-encryption (ACC-PRE), which is proved to be master secret secure and Chosen-ciphertext attack (CCA) secure in random oracle model. We give the application protocols and make the comparisons between some existing approaches and UCDSC.
引用
收藏
页码:753 / 760
页数:8
相关论文
共 50 条
  • [41] SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs
    Wei, Lifei
    Zhu, Haojin
    Cao, Zhenfu
    Shen, Xuemin
    AD HOC & SENSOR WIRELESS NETWORKS, 2013, 19 (1-2) : 95 - 118
  • [42] User-Centric Security Service Model for Cloud Storage
    Yoo, SeongMin
    Park, PyungKoo
    Shin, JinSeop
    Ryu, HoYong
    Ryou, JaeCheol
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 373 - 382
  • [43] User-centric Cross-OSN Multimedia Computing
    Sang, Jitao
    MM'15: PROCEEDINGS OF THE 2015 ACM MULTIMEDIA CONFERENCE, 2015, : 1333 - 1334
  • [44] Managing user-centric adaptive services for pervasive computing
    Lewis, D
    O'Donnell, T
    Feeney, K
    Brady, A
    Wade, V
    INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, : 248 - 255
  • [45] Benchmarking Private Cloud Performance with User-Centric Metrics
    Sun, Bin
    Hall, Brian
    Wang, Hu
    Zhang, Da Wei
    Ding, Kai
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 311 - 318
  • [46] UIE: User-centric Interference Estimation for Cloud Applications
    Javadi, Seyyed Ahmad
    Mehra, Sagar
    Vangoor, Bharath Kumar Reddy
    Gandhi, Anshul
    PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2016, : 119 - 122
  • [47] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [48] A user-centric applications sharing model on pervasive computing
    Zhu, Zhenmin
    Jiang, Faqun
    Su, Xiaoli
    Li, Jintao
    Ye, Jian
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 576 - 581
  • [49] User-centric resource allocation hierarchy in grid computing
    Liu, Shaofeng
    SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 228 - 235
  • [50] User-Centric Affective Computing of Image Emotion Perceptions
    Zhao, Sicheng
    Yao, Hongxun
    Xie, Wenlong
    Jiang, Xiaolei
    THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, : 4284 - 4285