Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage

被引:5
|
作者
Hou, Huiying [1 ]
Ning, Jianting [2 ,3 ]
Zhao, Yunlei [1 ,4 ]
Deng, Robert [5 ]
机构
[1] Fudan Univ, Coll Comp Sci & Technol, Shanghai 200433, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyher Secur, Fuzhou 350117, Fujian, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[5] Singapore Management Univ, Secure Mobile Ctr, Sch Informat Syst, Singapore 178902, Singapore
基金
上海市科技启明星计划; 中国国家自然科学基金;
关键词
Cloud computing; Security; Digital signatures; Standards; Encryption; Economics; Data models; Cloud storage; data sharing; accountability; attribute-based cryptography; sanitizable signature; ATTRIBUTE-BASED SIGNATURE;
D O I
10.1109/TDSC.2021.3100401
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing cloud storage service, users can enjoy non-interactive data sharing. Nonetheless, the data owner cannot timely update the shared data all the while. To ensure the timeliness and the authoritative source of the data, some users should be allowed to update the data on behalf of an authoritative data owner without changing data source. However, this allows harmful information to be injected into the data unnoticeably. How to efficiently realize editable cloud-based data sharing supporting malicious user tracing has not been fully explored. To address the problem, we propose a fine-grained and controllably editable cloud-based data sharing scheme with malicious user accountability. The data owner only needs to sign the shared data before uploading it and can specify a fine-grained access control policy about who can update the data and which portions of the data can be updated. The authorized users non-interactively convert signatures of original data into new ones for the updated data, which are indistinguishable from the original signatures. The proposed scheme also supports malicious user accountability in the sense that malicious users who post harmful information can be traced. We demonstrate the security and practicality of our scheme via formal security analysis and extensive experiments.
引用
收藏
页码:3448 / 3463
页数:16
相关论文
共 50 条
  • [41] A fine-grained GPU sharing and job scheduling for deep learning jobs on the cloud
    Chung, Wu-Chun
    Tong, Jyun-Sen
    Chen, Zhi-Hao
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (02):
  • [42] A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems
    Wang, Shangping
    Zhang, Yinglong
    Zhang, Yaling
    IEEE ACCESS, 2018, 6 : 38437 - 38450
  • [43] Fine-Grained Allocation Algorithm for Sharing Heterogeneous Resources in Data Center
    Tang X.
    Fu Y.
    Fan X.
    Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2020, 38 (03): : 589 - 595
  • [44] A fine-grained medical data sharing scheme based on federated learning
    Liu, Wei
    Zhang, Ying-Hui
    Li, Yi-Fei
    Zheng, Dong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (20):
  • [45] A fine-grained and secure health data sharing scheme based on blockchain
    Chen, Jiahao
    Yin, Xinchun
    Ning, Jianting
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09)
  • [46] Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
    Liu, Chang
    Chen, Jinjun
    Yang, Laurence T.
    Zhang, Xuyun
    Yang, Chi
    Ranjan, Rajiv
    Kotagiri, Ramamohanarao
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) : 2234 - 2244
  • [47] Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare
    Liu, Jianghua
    Xu, Lei
    Gu, Bruce
    Cui, Lei
    Zhu, Fei
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 443 - 458
  • [48] A Generic, Scalable and Fine-grained Data Access System for Sharing Digital Objects in Honest but Curious Cloud Environments
    Ibrahim, Ibrahim M.
    El-Din, Sherif H. Nour
    Elgohary, Rania
    Faheem, Hossam
    Mostafa, Mostafa G. M.
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 15 - 22
  • [49] Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
    Xu, Peng
    Chen, Hongwu
    Zou, Deqing
    Jin, Hai
    CHINESE SCIENCE BULLETIN, 2014, 59 (32): : 4201 - 4209
  • [50] A Secure and Efficient Revocation Scheme for Fine-Grained Access Control in Cloud Storage
    Lv, Zhiquan
    Hong, Cheng
    Zhang, Min
    Feng, Dengguo
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,