Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage

被引:5
|
作者
Hou, Huiying [1 ]
Ning, Jianting [2 ,3 ]
Zhao, Yunlei [1 ,4 ]
Deng, Robert [5 ]
机构
[1] Fudan Univ, Coll Comp Sci & Technol, Shanghai 200433, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyher Secur, Fuzhou 350117, Fujian, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[5] Singapore Management Univ, Secure Mobile Ctr, Sch Informat Syst, Singapore 178902, Singapore
基金
上海市科技启明星计划; 中国国家自然科学基金;
关键词
Cloud computing; Security; Digital signatures; Standards; Encryption; Economics; Data models; Cloud storage; data sharing; accountability; attribute-based cryptography; sanitizable signature; ATTRIBUTE-BASED SIGNATURE;
D O I
10.1109/TDSC.2021.3100401
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing cloud storage service, users can enjoy non-interactive data sharing. Nonetheless, the data owner cannot timely update the shared data all the while. To ensure the timeliness and the authoritative source of the data, some users should be allowed to update the data on behalf of an authoritative data owner without changing data source. However, this allows harmful information to be injected into the data unnoticeably. How to efficiently realize editable cloud-based data sharing supporting malicious user tracing has not been fully explored. To address the problem, we propose a fine-grained and controllably editable cloud-based data sharing scheme with malicious user accountability. The data owner only needs to sign the shared data before uploading it and can specify a fine-grained access control policy about who can update the data and which portions of the data can be updated. The authorized users non-interactively convert signatures of original data into new ones for the updated data, which are indistinguishable from the original signatures. The proposed scheme also supports malicious user accountability in the sense that malicious users who post harmful information can be traced. We demonstrate the security and practicality of our scheme via formal security analysis and extensive experiments.
引用
收藏
页码:3448 / 3463
页数:16
相关论文
共 50 条
  • [31] Flexible Selective Data Sharing With Fine-Grained Erasure in VANETs
    Liu, Hang
    Ming, Yang
    Wang, Chenhao
    Zhao, Yi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9582 - 9597
  • [32] ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage
    Yue, Zhengyu
    Yao, Yuanzhi
    Li, Weihai
    Yu, Nenghai
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 3448 - 3453
  • [33] Fine-Grained Query Authorization With Integrity Verification Over Encrypted Spatial Data in Cloud Storage
    Tian, Feng
    Wu, Zhenqiang
    Gui, Xiaolin
    Ni, Jianbing
    Shen, Xuemin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 1831 - 1847
  • [34] Privacy-Preserving Fine-Grained Data Sharing With Dynamic Service for the Cloud-Edge IoT
    Sun, Jianfei
    Bao, Yangyang
    Qiu, Weidong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Cheng, Xiaochun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1329 - 1346
  • [35] Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoT
    Halder, Subir
    Newe, Thomas
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [36] A fine-grained rule partition algorithm in cloud data centers
    Jiang, Wei
    Jiang, Wanchun
    Wang, Weiping
    Wang, Haodong
    Pan, Yi
    Wang, Jianxin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 113 : 14 - 25
  • [37] Fine-grained Audit Privilege Control for Integrity Audit on Cloud Storage
    Ruan, He-Ming
    Lei, Chin-Laung
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 156 - 163
  • [38] A fine-grained data access control algorithm in cloud computing
    Han, Dezhi
    Wu, Shuai
    Bi, Kun
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 245 - 248
  • [39] Achieving fine-grained access control and integrity auditing in cloud storage
    Yuan, S. (ysm1005@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [40] Multi-authority fine-grained access control with accountability and its application in cloud
    Li, Jin
    Chen, Xiaofeng
    Chow, Sherman S. M.
    Huang, Qiong
    Wong, Duncan S.
    Liu, Zheli
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 112 : 89 - 96