On the Resource Consumption of Secure Data Sharing

被引:0
|
作者
Kuehner, Holger [1 ]
Hartenstein, Hannes
机构
[1] Karlsruhe Inst Technol, Steinbuch Ctr Comp, Karlsruhe, Germany
关键词
D O I
10.1109/Trustcom.2015.460
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sharing data within a closed user group is the basis for lots of applications today in both personal and professional life. The risk that the storage provider or an attacker illegitimately inspects or tampers with the shared data can be mitigated by employing client-side cryptography. In this work, we estimate the resource consumption that secure data sharing based on client-side cryptography requires in terms of computation time and network traffic volume. We therefore go beyond asymptotical analyses and state the absolute resource consumption for different secure data sharing protocols and client devices under realistic sharing models. These sharing models are extracted from traces of real-world collaboration platforms running in production. To the best of our knowledge, this is the first time that such a characterization of sharing models is published. Furthermore, we provide a clearly defined resource consumption estimation model. Our results show that for users who just up-and download data, the execution time of required cryptographic operations is typically up to a few seconds. The results also show that group owners have to deal with significantly higher computation times and network traffic when a user is removed from a sharing group with a few hundred or more members, given that basic secure data sharing protocols are used as they are in place today. A further finding is that computation time and network traffic volume are considerably lowered by extending the secure data sharing protocol with group key management approaches, at the price of slightly raised computation times for smaller groups.
引用
收藏
页码:880 / 889
页数:10
相关论文
共 50 条
  • [1] A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation
    von Maltitz, Marcel
    Carle, Georg
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2018, 11025 : 355 - 372
  • [2] Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments
    Ssembatya, Richard
    Kayem, Anne V. D. M.
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 411 - 416
  • [3] Secure and useful data sharing
    Sarathy, Rathindra
    Muralidhar, Krishnamurty
    DECISION SUPPORT SYSTEMS, 2006, 42 (01) : 204 - 220
  • [4] On the secure sharing of legacy data
    Russell, Douglas
    Power, David
    Slaymaker, Mark
    Mostefaoui, Ghita Kouadri
    Ma, Xiaoqi
    Simpson, Andrew
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1676 - 1679
  • [5] Matchbox: Secure data sharing
    Goldman, K
    Valdez, E
    IEEE INTERNET COMPUTING, 2004, 8 (06) : 18 - 24
  • [6] Sharing in the Rain: Secure and Efficient Data Sharing for the Cloud
    Michalas, Antonis
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 182 - 187
  • [7] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35
  • [8] SECURE MULTIOWNER DATA SHARING IN THE CLOUD
    Deepika, K. S.
    Balakrishnan, Ranjith
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [9] SeDaSC: Secure Data Sharing in Clouds
    Ali, Mazhar
    Dhamotharan, Revathi
    Khan, Eraj
    Khan, Samee U.
    Vasilakos, Athanasios V.
    Li, Keqin
    Zomaya, Albert Y.
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 395 - 404
  • [10] Reencryption Scheme for Secure Data Sharing
    Muthusenthil, B.
    Nivetha, D.
    Kim, Hyunsung
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 1170 - 1174