Efficient and secure big data storage system with leakage resilience in cloud computing

被引:0
作者
Yinghui Zhang
Menglei Yang
Dong Zheng
Pengzhen Lang
Axin Wu
Chen Chen
机构
[1] Xi’an University of Posts and Telecommunications,National Engineering Laboratory for Wireless Security
[2] Westone Cryptologic Research Center,undefined
来源
Soft Computing | 2018年 / 22卷
关键词
Cloud computing; Big data; Leakage resilience; Data security;
D O I
暂无
中图分类号
学科分类号
摘要
With recent advancements in wireless smart terminal manufacture and communication technologies, a huge amount of data are generated from a variety of sources including software applications and hardware devices. To make the most of big data, cloud computing can be exploited to store, share, and process the data. However, data privacy issues are still significantly challenging in practice where users’ secrets may be leaked because of diverse software vulnerabilities and hardware attacks. In this paper, to address the above security challenge of big data, we propose an efficient and secure big data storage system in cloud computing, in which a leakage-resilient encryption scheme serves as the main ingredient. What’s more, our formal security proofs analysis indicates that the proposed scheme can ensure users’ data privacy even if the partial key is leaked in cloud computing. Finally, the leakage resilience analysis indicates that the leakage ratio in our scheme can reach roughly 1/3 and is higher than other schemes. Performance comparisons show the practicability of our scheme for big data security in cloud computing.
引用
收藏
页码:7763 / 7772
页数:9
相关论文
共 179 条
[1]  
Berti F(2017)On leakage-resilient authenticated encryption with decryption leakages IACR Trans Symmetric Cryptol 2017 271-293
[2]  
Pereira O(2016)Verifiable computation over large database with incremental updates IEEE Trans Comput 65 3184-3195
[3]  
Peters T(2001)Electromagnetic analysis: concrete results Lecture Notes Comput Sci 2162 251-261
[4]  
Standaert FX(2018)Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack Inf Sci 444 72-88
[5]  
Chen X(2015)Editorial (thematic issue: cyber security, privacy and forensics for complex systems) Int J Sens Wirel Commun Control 5 2-9208
[6]  
Li J(2016)Handbook of research on modern cryptographic solutions for computer and cyber security IGI Global 77 9203-241
[7]  
Weng J(2018)Advances in security and privacy of multimedia big data in mobile and cloud computing Multimed Tools Appl 412 223-298
[8]  
Ma J(2017)Insight of the protection for data security under selective opening attacks Inf Sci 85 273-196
[9]  
Lou W(2017)Anonymous and leakage resilient ibe and ipe Des Codes Cryptogr 4 187-3579
[10]  
Gandolfi K(2013)Leakage-resilient identity-based encryption scheme Int J Grid Utility Comput 64 3569-1075