A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing

被引:71
作者
Shen, Jian [1 ,2 ]
Yang, Huijie [1 ]
Vijayakumar, Pandi [3 ]
Kumar, Neeraj [4 ,5 ,6 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[2] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518066, Peoples R China
[3] Anna Univ, Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Chennai 604001, Tamil Nadu, India
[4] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[5] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[6] Univ Petr & Energy Studies, Sch Comp, Dehra Dun 248007, Uttarakhand, India
基金
中国国家自然科学基金;
关键词
Servers; Cloud computing; Security; Distributed databases; Data privacy; Protocols; Data models; Data sharing; oblivious random access memory; cloud computing; multiple users; USER AUTHENTICATION; INDUSTRIAL INTERNET; KEYWORD SEARCH; ENCRYPTION;
D O I
10.1109/TDSC.2021.3050517
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, the great amount of storage data requires safe and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of shared data is ensured to achieve data privacy preservation. Second, the security of stored data is ensured. That is, when stored shared data are subject to frequent access operations, the address sequence or access pattern of data is hidden. Therefore, determining how to ensure the untraceability of stored data or efficient hide the data access pattern in sharing stored data is a challenge. By employing the proxy re-encryption algorithm and oblivious random access memory (ORAM), a privacy-preserving and untraceable scheme is proposed to support multiple users in sharing data in cloud computing. On the one hand, group members and a proxy use the key exchange phase to obtain keys and resist multiparty collusion if necessary. The ciphertext obtained according to the proxy re-encryption phase enables group members to implement access control and store data, thereby completing secure data sharing. On the other hand, this article realizes data untraceability and a hidden data access pattern through a one-way circular linked table in a binary tree (OCLT) and obfuscation operation. Additionally, based on the designed structure and pointer tuple, malicious users are identified and data tampering is prevented. The security analysis shows that the protocol designed in this article can meet the security requirements of proxy re-encryption and ORAM. Both theoretical and experimental analyses demonstrate that the proposed scheme is secure and efficient for group data sharing in cloud computing.
引用
收藏
页码:2198 / 2210
页数:13
相关论文
共 30 条
[1]   SeDaSC: Secure Data Sharing in Clouds [J].
Ali, Mazhar ;
Dhamotharan, Revathi ;
Khan, Eraj ;
Khan, Samee U. ;
Vasilakos, Athanasios V. ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :395-404
[2]  
[Anonymous], 2011, PROC INT C SECUR PRI
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]   Secure clustering for efficient data dissemination in vehicular cyber-physical systems [J].
Bali, Rasmeet S. ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :476-492
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]  
Chakraborti Anrin, 2019, LOCALITY 26 ANN NETW, DOI [10.14722/ndss.2019.23320, DOI 10.14722/NDSS.2019.23320]
[7]   An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Kumar, Neeraj ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Vasilakos, Athanasios V. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 :534-554
[8]   New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations [J].
Chen, Xiaofeng ;
Huang, Xinyi ;
Li, Jin ;
Ma, Jianfeng ;
Lou, Wenjing ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :69-78
[9]   Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. ;
Rodrigues, Joel J. P. C. .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06) :4900-4913
[10]  
Gentry Craig, 2015, Applied Cryptography and Network Security. 13th International Conference, ACNS 2015. RevisedSelected Papers: LNCS 9092, P172, DOI 10.1007/978-3-319-28166-7_9