A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era

被引:20
作者
Han, Si [1 ,2 ]
Han, Ke [3 ]
Zhang, Shouyi [4 ]
机构
[1] China Univ Polit Sci & Law, Dept Sci & Technol, Beijing 102249, Peoples R China
[2] China Univ Polit Sci & Law, Sch Informat Management Law, Beijing 102249, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100083, Peoples R China
[4] Beijing Jiaotong Univ, Sch Mech Elect & Control Engn, Beijing 100044, Peoples R China
关键词
Big data; security and privacy; cloud storage; data sharing; ACCESS-CONTROL; EFFICIENT; NETWORKS; SYSTEM;
D O I
10.1109/ACCESS.2019.2914862
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cloud-based big data sharing system utilizes a storage facility from a cloud service provider to share data with legitimate users. In contrast to traditional solutions, cloud provider stores the shared data in the large data centers outside the trust domain of the data owner, which may trigger the problem of data confidentiality. This paper proposes a secret sharing group key management protocol (SSGK) to protect the communication process and shared data from unauthorized access. Different from the prior works, a group key is used to encrypt the shared data and a secret sharing scheme is used to distribute the group key in SSGK. The extensive security and performance analyses indicate that our protocol highly minimizes the security and privacy risks of sharing data in cloud storage and saves about 12% of storage space.
引用
收藏
页码:60290 / 60298
页数:9
相关论文
共 38 条
[1]   A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing [J].
Ahuja, Rohit ;
Mohanty, Sraban Kumar ;
Sakurai, Kouichi .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 57 :241-256
[2]  
[Anonymous], 2011, INT J EMERGING TECHN
[3]   SDN and Virtualization Solutions for the Internet of Things:A Survey [J].
Bizanis, Nikos ;
Kuipers, Fernando A. .
IEEE ACCESS, 2016, 4 :5591-5606
[4]  
Blakley GR, 1979, P NATL COMPUTER C, P313, DOI 10.1109/MARK.1979.8817296
[5]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[6]   Healthcare-Related Data in the Cloud: Challenges and Opportunities [J].
Casola, Valentina ;
Castiglione, Aniello ;
Choo, Kim-Kwang Raymond ;
Esposito, Christian .
IEEE CLOUD COMPUTING, 2016, 3 (06) :10-14
[7]  
Chor B., 1985, 26th Annual Symposium on Foundations of Computer Science (Cat. No.85CH2224-4), P383, DOI 10.1109/SFCS.1985.64
[8]  
Fu ZJ, 2016, IEEE INFOCOM SER
[9]   Secure Integration of Asymmetric and Symmetric Encryption Schemes [J].
Fujisaki, Eiichiro ;
Okamoto, Tatsuaki .
JOURNAL OF CRYPTOLOGY, 2013, 26 (01) :80-101
[10]   Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption [J].
Han, Jinguang ;
Susilo, Willy ;
Mu, Yi ;
Zhou, Jianying ;
Au, Man Ho Allen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :665-678