Privacy preserving protocol for service aggregation in cloud computing

被引:2
作者
Wang, Peishun [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
Yan, Jun [2 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[2] Univ Wollongong, Sch Informat Syst & Technol, Wollongong, NSW 2522, Australia
关键词
service aggregation; cloud computing; privacy; re-encryption;
D O I
10.1002/spe.1129
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing has increasingly become a new model in the world of computing, and more businesses are moving to the cloud. As a cost-effective and time-efficient way to develop new applications and services, service aggregation in cloud computing empowers all service providers and consumers and creates tremendous opportunities in various industry sectors. However, it also poses various challenges to the privacy of personal information as well as the confidentiality of business and governmental information. The full benefits of service aggregation in cloud computing would only be enjoyed if the privacy concerns are addressed properly. In this paper, we investigate the privacy issues in service aggregation in a cloudenvironment and propose a privacy preserving protocol that is suitable for this environment. To demonstrate the security of our system, we construct a security game called IND-P3SAC-CPA and prove the security of the protocol accordingly. Our protocol has a distinct property that allows any service provider to obtain only the queried data under its conspiracy with the cloud. Additionally, the efficiency and various extensions are also discussed. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:467 / 483
页数:17
相关论文
共 24 条
[1]  
AmazonWeb Services LLC, 2009, CAS STUD TC3 HLTH
[2]  
[Anonymous], 2009, PRIVACY CLOUDS RISKS
[3]  
[Anonymous], 2003, P NETW DISTR SYST SE
[4]  
ATENIESE G, 2005, P 12 ANN NETW DISTR
[5]  
Ateniese G, 2009, LECT NOTES COMPUT SC, V5473, P279, DOI 10.1007/978-3-642-00862-7_19
[6]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]  
Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
[9]  
Chow SSM, 2010, LECT NOTES COMPUT SC, V6055, P316
[10]  
CSA (Cloud Security Alliance), 2009, SEC GUID CRIT AR FOC, V1