Index Generation and Secure Multi-User Access Control over an Encrypted Cloud Data

Cloud computing provides economical and effective solution for sharing data among cloud users with low maintenance cost. The security of data and identity confidentiality while sharing data in multi-owner way cannot be assured by the Cloud Service Providers (CSP's). The Cloud Service Providers are reliable but curious to know the recurrent membership changes in the cloud. In this paper, we propose a secure multi-owner data sharing for dynamic group in the cloud with RSA Chinese Remainder Theorem (RSA-CRT) encryption technique and substring index generation method. RSA-CRT efficiently manages revocation list, key management, with reduced storage and computational overhead. The substring Index generation algorithm reduces the storage space compared to wild card fuzzy alogorithm(1). (C) 2016 The Authors. Published by Elsevier B.V.

[1]  Ma Wenping,et al.  An Effective Fuzzy Keyword Search Scheme in Cloud Computing , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[2]  Rajkumar Buyya,et al.  DRSIG: Domain and Range Specific Index Generation for encrypted Cloud data , 2016, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).

[3]  R. Buyya,et al.  MSSS : Most Significant Single-keyword Search over Encrypted Cloud Data , 2015 .

[4]  Thomas Fuhrmann,et al.  Cryptographically Enforced Permissions for Fully Decentralized File Systems , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).

[5]  Yuqing Zhang,et al.  Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.

[6]  Lee Sael,et al.  Procedia Computer Science , 2015 .

[7]  Hung-Min Sun,et al.  An Approach Towards Rebalanced RSA-CRT with Short Public Exponent , 2005, IACR Cryptol. ePrint Arch..

[8]  T. Vijayalakshmi,et al.  Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2015 .

[9]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[10]  Qian Wang,et al.  Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.

[11]  Robert H. Deng,et al.  HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.

[12]  Mostafa H. Ammar,et al.  A file-centric model for peer-to-peer file sharing systems , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[13]  K. R. Venugopal,et al.  MSIGT: Most Significant Index Generation Technique for cloud environment , 2015, 2015 Annual IEEE India Conference (INDICON).

[14]  M. M. A. Hashem,et al.  A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture , 2013, ArXiv.

[15]  K. R. Venugopal,et al.  IGSK: Index Generation on Split Keyword for search over cloud data , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).

[16]  Neelam S. Khan,et al.  Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data , 2014, 2014 International Conference on Computer and Communication Technology (ICCCT).

[17]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[18]  Hui Li,et al.  Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.