Modified SeDaSc system for efficient data sharing in the cloud

被引:1
作者
Areed, Marwa F. [1 ]
Rashed, Mohamed M. [2 ]
Fayez, Nehal [2 ]
Abdelhay, Ehab H. [2 ]
机构
[1] Damietta Univ, Dept Elect Engn, Fac Engn, Dumyat, Egypt
[2] Mansoura Univ, Fac Engn, Dept Elect & Commun, Mansoura, Egypt
关键词
cloud computing; cloud storage; deduplication; SeDaSc; secure cloud group sharing; SECURITY;
D O I
10.1002/cpe.6377
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Organizations tend to store their sensitive data on trusted cloud data storage server to protect it from outside security attacks. However, storing data on the cloud has serious security issues like data misuse from the cloud vendors themselves and attacks from outsources. In this manner, the organizations tend to encrypt their data before storing it in the cloud to protect against the misuse from the cloud vendors and other outer attacks. This article offers an enhancement to Secure Data Sharing in the Cloud (SeDaSc) system in terms of enhancing security metrics related to data privacy and disk storage handling. In the proposed system, the cryptographic server (CS) has been treated a semi-trusted entity by not giving direct access to the data directly. The data encryption is carried at the client side. While, the keys generation and other related cryptographic operations as the access control list (ACL) management are carried at the CS. The client generates the hash of the file needed to be shared in the cloud and then sends such hash to the CS. Then, the CS uses the hash to generate the cryptographic key and sends it to the client for encryption process. Further, the proposed system achieves better disk management by only updating the ACL in case of uploading the same file more than once. The CS stores generated key hash and whenever receives a new file, the CS compares the hash of the generated key with other stored hashes. The hash computation in key generation in the proposed system makes the key generation process varies with data size in compare with the key generation process in SeDaSc that is independent on data size. Furthermore, in the case of identical hashes, the ACL will only be updated. Therefore, the identical files neither will be encrypted nor uploaded to cloud twice. The proposed system has been represented mathematically and graphically using high level petri net model and simulated by python language environment.
引用
收藏
页数:10
相关论文
共 33 条
[1]  
Adya A, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P1
[2]   SeDaSC: Secure Data Sharing in Clouds [J].
Ali, Mazhar ;
Dhamotharan, Revathi ;
Khan, Eraj ;
Khan, Samee U. ;
Vasilakos, Athanasios V. ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :395-404
[3]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[4]  
[Anonymous], 2013, FLUD BACKUP SYSTEM
[5]  
[Anonymous], 2002, FIPS180 2
[6]  
[Anonymous], 2010, P US LIS SAN JOS CA
[7]  
[Anonymous], 2013, CIPHERTITE DATA BACK
[8]  
[Anonymous], 2014, BITCASA INFINITE STO
[9]  
[Anonymous], 2018, P 7 ANN CISC GLOB CL
[10]  
[Anonymous], 2008, P 4 ACM INT WORKSHOP