On the Resource Consumption of Secure Data Sharing

被引:0
|
作者
Kuehner, Holger [1 ]
Hartenstein, Hannes
机构
[1] Karlsruhe Inst Technol, Steinbuch Ctr Comp, Karlsruhe, Germany
关键词
D O I
10.1109/Trustcom.2015.460
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sharing data within a closed user group is the basis for lots of applications today in both personal and professional life. The risk that the storage provider or an attacker illegitimately inspects or tampers with the shared data can be mitigated by employing client-side cryptography. In this work, we estimate the resource consumption that secure data sharing based on client-side cryptography requires in terms of computation time and network traffic volume. We therefore go beyond asymptotical analyses and state the absolute resource consumption for different secure data sharing protocols and client devices under realistic sharing models. These sharing models are extracted from traces of real-world collaboration platforms running in production. To the best of our knowledge, this is the first time that such a characterization of sharing models is published. Furthermore, we provide a clearly defined resource consumption estimation model. Our results show that for users who just up-and download data, the execution time of required cryptographic operations is typically up to a few seconds. The results also show that group owners have to deal with significantly higher computation times and network traffic when a user is removed from a sharing group with a few hundred or more members, given that basic secure data sharing protocols are used as they are in place today. A further finding is that computation time and network traffic volume are considerably lowered by extending the secure data sharing protocol with group key management approaches, at the price of slightly raised computation times for smaller groups.
引用
收藏
页码:880 / 889
页数:10
相关论文
共 50 条
  • [21] Standards for secure data sharing across organizations
    Harris, Douglas
    Khan, Latifur
    Paul, Raymond
    Thuraisingham, Bhavani
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 86 - 96
  • [22] Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud
    Zhang, Yun
    Patwa, Farhan
    Sandhu, Ravi
    Tang, Bo
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2015, : 419 - 426
  • [23] Towards Secure Resource Sharing for Impromptu Collaboration in Pervasive Computing
    Claycomb, William
    Shin, Dongwan
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 940 - 946
  • [24] Addressing Techniques for Secure Data Sharing in Cloud
    Bhagat, Arti
    Rathee, Nisha
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 499 - 503
  • [25] Evaluation of Container Overlays for Secure Data Sharing
    Shakeri, Sara
    Veen, Lourens
    Grosso, Paola
    2020 IEEE 45TH LOCAL COMPUTER NETWORKS SYMPOSIUM ON EMERGING TOPICS IN NETWORKING (LCN SYMPOSIUM 2020), 2020, : 99 - 108
  • [26] Secure and Controlled Sharing of Data in Distributed Computing
    Thilakanathan, Danan
    Calvo, Rafael
    Chen, Shiping
    Nepal, Surya
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 825 - 832
  • [27] Secure Data Sharing and Processing in Heterogeneous Clouds
    Suzic, Bojan
    Reiter, Andreas
    Reimair, Florian
    Venturi, Daniele
    Kubo, Baldur
    1ST INTERNATIONAL CONFERENCE ON CLOUD FORWARD: FROM DISTRIBUTED TO COMPLETE COMPUTING, 2015, 68 : 116 - 126
  • [28] Blockchain based Secure Data Sharing Model
    Wang, Shi
    Liu, Jing
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 464 - 469
  • [29] Secure Medical Data Sharing For Healthcare System
    Chkirbene, Zina
    Hamila, Ridha
    Erbad, Aiman
    2022 IEEE 33RD ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (IEEE PIMRC), 2022, : 641 - 647
  • [30] DevSecOps for the Transition of Secure Data Sharing Technology
    Landry, Adam
    Schuette, Jason
    Schurgot, Mary R.
    OPEN ARCHITECTURE/OPEN BUSINESS MODEL NET-CENTRIC SYSTEMS AND DEFENSE TRANSFORMATION 2022, 2022, 12119