Modified SeDaSc system for efficient data sharing in the cloud

被引:1
作者
Areed, Marwa F. [1 ]
Rashed, Mohamed M. [2 ]
Fayez, Nehal [2 ]
Abdelhay, Ehab H. [2 ]
机构
[1] Damietta Univ, Dept Elect Engn, Fac Engn, Dumyat, Egypt
[2] Mansoura Univ, Fac Engn, Dept Elect & Commun, Mansoura, Egypt
关键词
cloud computing; cloud storage; deduplication; SeDaSc; secure cloud group sharing; SECURITY;
D O I
10.1002/cpe.6377
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Organizations tend to store their sensitive data on trusted cloud data storage server to protect it from outside security attacks. However, storing data on the cloud has serious security issues like data misuse from the cloud vendors themselves and attacks from outsources. In this manner, the organizations tend to encrypt their data before storing it in the cloud to protect against the misuse from the cloud vendors and other outer attacks. This article offers an enhancement to Secure Data Sharing in the Cloud (SeDaSc) system in terms of enhancing security metrics related to data privacy and disk storage handling. In the proposed system, the cryptographic server (CS) has been treated a semi-trusted entity by not giving direct access to the data directly. The data encryption is carried at the client side. While, the keys generation and other related cryptographic operations as the access control list (ACL) management are carried at the CS. The client generates the hash of the file needed to be shared in the cloud and then sends such hash to the CS. Then, the CS uses the hash to generate the cryptographic key and sends it to the client for encryption process. Further, the proposed system achieves better disk management by only updating the ACL in case of uploading the same file more than once. The CS stores generated key hash and whenever receives a new file, the CS compares the hash of the generated key with other stored hashes. The hash computation in key generation in the proposed system makes the key generation process varies with data size in compare with the key generation process in SeDaSc that is independent on data size. Furthermore, in the case of identical hashes, the ACL will only be updated. Therefore, the identical files neither will be encrypted nor uploaded to cloud twice. The proposed system has been represented mathematically and graphically using high level petri net model and simulated by python language environment.
引用
收藏
页数:10
相关论文
共 33 条
[21]   Secure attribute-based data sharing for resource-limited users in cloud computing [J].
Li, Jin ;
Zhang, Yinghui ;
Chen, Xiaofeng ;
Xiang, Yang .
COMPUTERS & SECURITY, 2018, 72 :1-12
[22]  
Lifei Wei, 2010, Proceedings 2010 30th International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), P52, DOI 10.1109/ICDCSW.2010.36
[23]   Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services [J].
Liu, Joseph K. ;
Au, Man Ho ;
Huang, Xinyi ;
Lu, Rongxing ;
Li, Jin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (03) :484-497
[24]  
Marques L., 2011, Proceedings of the 2011 Workshop on Open Source and Design of Communication, P19
[25]   PETRI NETS - PROPERTIES, ANALYSIS AND APPLICATIONS [J].
MURATA, T .
PROCEEDINGS OF THE IEEE, 1989, 77 (04) :541-580
[26]  
Rahumed A., 2011, Proceedings of the 2011 International Conference on Parallel Processing Workshops (ICPPW 2011), P160, DOI 10.1109/ICPPW.2011.17
[27]   Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage [J].
Shen, Wenting ;
Qin, Jing ;
Yu, Jia ;
Hao, Rong ;
Hu, Jiankun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) :331-346
[28]   Pergamum: Replacing tape with energy efficient, reliable, disk-based archival storage [J].
Storer, Mark W. ;
Greenan, Kevin M. ;
Miller, Ethan L. ;
Voruganti, Kaladhar .
PROCEEDINGS OF THE 6TH USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES (FAST '08), 2008, :1-+
[29]   Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage [J].
Tian, Hui ;
Chen, Yuxiang ;
Chang, Chin-Chen ;
Jiang, Hong ;
Huang, Yongfeng ;
Chen, Yonghong ;
Liu, Jin .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) :701-714
[30]  
Trepetin S., 2001, UNPUB