A multi-layer information dispersal based encryption algorithm and its application for access control

Abstract High performance encryption is a key means to minimize security risks as protecting private data in cloud or big data environments. In this paper, a new encryption model SIDA is proposed based on the information dispersal and multi-layer encryption. From theoretical analysis and experiments, it shows that SIDA is secure, can not only significantly improve the speed of data encryption and decryption, but also reduce the bandwidth consumption and re-encryption overhead when revoking authority. Taking SIDA4 algorithm as an example, the encryption speed is about 1.6 times of AES. While the overhead of re-encryption when revoking authority, SIDA4 in communication and computation are 1/4 of AES. The real scenario of access control when using SIDA is also discussed in detail in the paper, which shows great prospects in low bandwidth, high performance and big data applications.

[1]  Vishal Kumar,et al.  Multiple Encryption using ECC and its Time Complexity Analysis , 2016 .

[2]  Qiang Zhan,et al.  Research on encryption strategy in large data environment based on proxy re-encryption , 2017, Int. J. Big Data Intell..

[3]  Aoying Zhou,et al.  DSP RE-Encryption: A Flexible Mechanism for Access Control Enforcement Management in DaaS , 2009, 2009 IEEE International Conference on Cloud Computing.

[4]  Soon Myoung Chung,et al.  Semantic-Based Access Control for Data Resources in Open Grid Services Architecture: Data Access and Integration (OGSA-DAI) , 2014, Int. J. Grid High Perform. Comput..

[5]  Wu-chi Feng,et al.  Efficient multi-layer coding and encryption of MPEG video streams , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[6]  Subhamoy Maitra,et al.  High-Performance Hardware Implementation for RC4 Stream Cipher , 2013, IEEE Transactions on Computers.

[7]  Gurpreet Singh,et al.  A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.

[8]  Wu-chi Feng,et al.  Lightweight security mechanisms for wireless video transmission , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[9]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[10]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[11]  Lintian Qiao,et al.  A New Algorithm for MPEG Video Encryption , 2007 .

[12]  Martin E. Hellman,et al.  On the security of multiple encryption , 1981, CACM.

[13]  Li Hui,et al.  Secure and Privacy-Preserving Data Storage Service in Public Cloud , 2014 .

[14]  Lv Zhiquan Cryptographic Access Control Scheme for Cloud Storage , 2011 .

[15]  Ioan Raicu,et al.  Towards high-performance and cost-effective distributed storage systems with information dispersal algorithms , 2013, 2013 IEEE International Conference on Cluster Computing (CLUSTER).

[16]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[17]  Sushil Jajodia,et al.  Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.

[18]  Shao Bilin Security Structure of Cloud Storage Based on Dispersal , 2011 .

[19]  Zhang Min,et al.  achieving efficient dynamic cryptographic access control in cloud storage , 2011 .

[20]  Klara Nahrstedt,et al.  Comparison of MPEG encryption algorithms , 1998, Comput. Graph..

[21]  Hung-Min Sun,et al.  Optimal information-dispersal for increasing the reliability of a distributed service , 1997 .