Efficient and secure big data storage system with leakage resilience in cloud computing

With recent advancements in wireless smart terminal manufacture and communication technologies, a huge amount of data are generated from a variety of sources including software applications and hardware devices. To make the most of big data, cloud computing can be exploited to store, share, and process the data. However, data privacy issues are still significantly challenging in practice where users’ secrets may be leaked because of diverse software vulnerabilities and hardware attacks. In this paper, to address the above security challenge of big data, we propose an efficient and secure big data storage system in cloud computing, in which a leakage-resilient encryption scheme serves as the main ingredient. What’s more, our formal security proofs analysis indicates that the proposed scheme can ensure users’ data privacy even if the partial key is leaked in cloud computing. Finally, the leakage resilience analysis indicates that the leakage ratio in our scheme can reach roughly 1/3 and is higher than other schemes. Performance comparisons show the practicability of our scheme for big data security in cloud computing.

[1]  Futai Zhang,et al.  Leakage-resilient identity-based encryption scheme , 2013, Int. J. Grid Util. Comput..

[2]  Robert H. Deng,et al.  Blockchain based efficient and robust fair payment for outsourcing services in cloud computing , 2018, Inf. Sci..

[3]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[4]  Yinghui Zhang,et al.  Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing , 2018, Sensors.

[5]  Jian Shen,et al.  An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.

[6]  Jian Shen,et al.  Secure data uploading scheme for a smart home system , 2018, Inf. Sci..

[7]  Jiguo Li,et al.  Identity-based broadcast encryption with continuous leakage resilience , 2018, Inf. Sci..

[8]  Vinod Vaikuntanathan,et al.  Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.

[9]  Qinglan Zhao,et al.  Efficient and Privacy-Preserving Medical Data Sharing in Internet of Things With Limited Computing Power , 2018, IEEE Access.

[10]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[11]  Guy N. Rothblum,et al.  Securing Computation against Continuous Leakage , 2010, CRYPTO.

[12]  Jin Li,et al.  Differentially private Naive Bayes learning over multiple data sources , 2018, Inf. Sci..

[13]  Man Ho Au,et al.  Towards leakage-resilient fine-grained access control in fog computing , 2018, Future Gener. Comput. Syst..

[14]  Kaoru Kurosawa,et al.  Anonymous and leakage resilient IBE and IPE , 2016, Designs, Codes and Cryptography.

[15]  Thomas Peters,et al.  On Leakage-Resilient Authenticated Encryption with Decryption Leakages , 2017, IACR Trans. Symmetric Cryptol..

[16]  Jin Li,et al.  Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing , 2016, Secur. Commun. Networks.

[17]  Jin Li,et al.  Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..

[18]  Yi Mu,et al.  Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles , 2018, Comput. J..

[19]  Bo Yang,et al.  Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security , 2017, Comput. J..

[20]  Jin Li,et al.  Towards privacy protection and malicious behavior traceability in smart health , 2017, Personal and Ubiquitous Computing.

[21]  Kostas E. Psannis,et al.  Advanced Media-Based Smart Big Data on Intelligent Cloud Systems , 2019, IEEE Transactions on Sustainable Computing.

[22]  F. Richard Yu,et al.  Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation , 2017, Comput. J..

[23]  Moni Naor,et al.  Public-Key Cryptosystems Resilient to Key Leakage , 2009, SIAM J. Comput..

[24]  Allison Bishop,et al.  Storing Secrets on Continually Leaky Devices , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[25]  Xiaoyu Zhang,et al.  Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing , 2018, Soft Comput..

[26]  Xiaojun Zhang,et al.  A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage , 2018, Secur. Commun. Networks.

[27]  Jiguo Li,et al.  A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme , 2016, Comput. J..

[28]  Yael Tauman Kalai,et al.  Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[29]  Rui Guo,et al.  Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing , 2018, Comput. Informatics.

[30]  Robert H. Deng,et al.  Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.

[31]  Jin Li,et al.  Efficient attribute-based data sharing in mobile clouds , 2016, Pervasive Mob. Comput..

[32]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[33]  Patrick Simmons,et al.  Security through amnesia: a software-based solution to the cold boot attack on disk encryption , 2011, ACSAC '11.

[34]  T. Raju,et al.  In vivo and in vitro differentiation of neurons and astrocytes in the rat embryo. Immunofluorescence study with neurofilament and glial filament antisera. , 1981, Developmental biology.

[35]  Jin Li,et al.  Anonymous attribute-based proxy re-encryption for access control in cloud computing , 2016, Secur. Commun. Networks.

[36]  Hyungmin Kim,et al.  An Implantable Wireless Neural Interface System for Simultaneous Recording and Stimulation of Peripheral Nerve with a Single Cuff Electrode , 2017, Sensors.

[37]  Robert H. Deng,et al.  TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain , 2018, IEEE Access.

[38]  Brij Bhooshan Gupta,et al.  An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms , 2016, NSS.

[39]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[40]  Yinghui Zhang,et al.  Efficient and privacy-aware attribute-based data sharing in mobile cloud computing , 2017, Journal of Ambient Intelligence and Humanized Computing.

[41]  Ya Wang,et al.  Cloud Storage as the Infrastructure of Cloud Computing , 2010, 2010 International Conference on Intelligent Computing and Cognitive Informatics.

[42]  Stefan Dziembowski,et al.  Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[43]  Yevgeniy Dodis,et al.  Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.

[44]  Jian Shen,et al.  A Short Linearly Homomorphic Proxy Signature Scheme , 2018, IEEE Access.

[45]  Jin Li,et al.  DivORAM: Towards a practical oblivious RAM with variable block size , 2018, Inf. Sci..

[46]  Yevgeniy Dodis,et al.  Cryptography against Continuous Memory Attacks , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[47]  Jin Li,et al.  Multi-authority fine-grained access control with accountability and its application in cloud , 2018, J. Netw. Comput. Appl..

[48]  Jin Li,et al.  Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system , 2020, Future Gener. Comput. Syst..

[49]  Dharma P. Agrawal,et al.  Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing , 2017, Multimedia Tools and Applications.

[50]  Deepti Gaur,et al.  Robust Fuzzy Neuro system for Big Data Analytics , 2017 .

[51]  Mingwu Zhang,et al.  After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange , 2018, IEEE Systems Journal.

[52]  B. B. Gupta Editorial (Thematic Issue: Cyber Security, Privacy and Forensics for Complex Systems) , 2015 .

[53]  Jin Li,et al.  Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack , 2018, Inf. Sci..

[54]  Dawu Gu,et al.  Efficient chosen ciphertext secure identity-based encryption against key leakage attacks , 2016, Secur. Commun. Networks.

[55]  H. Li,et al.  Identity-based construction for secure and efficient handoff authentication schemes in wireless networks , 2012, Secur. Commun. Networks.

[56]  Xiaofeng Chen,et al.  Secure Distributed Deduplication Systems with Improved Reliability , 2015, IEEE Trans. Computers.

[57]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[58]  Jin Li,et al.  Privacy-preserving machine learning with multiple data providers , 2018, Future Gener. Comput. Syst..