Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security

The explosive growth of information imposes a huge storage burden on the personal communication terminal and causes serious challenges to the communication bandwidth and security. Therefore, many compressive sensing (CS) encryption schemes are proposed to solve this problem. However, the decryption key in these papers needs to be shared with the users and cannot prevent the receivers from intentionally leaking the key. Once the key is compromised, the cloud system could not find the traitor who reveals the key. To address the problem, we propose the compressive sensing scheme with traitor tracing for cloud storage, which can ensure information security and simultaneously reduce the storage and transmission burden while maintaining low overhead at the user side. The work presented supports anonymous traitor tracking that can track any anonymous traitors who reveal their keys, so guarantee the security of the key. In addition, our scheme handles the ciphertext integrity protection and energy leakage in existing CS encryption schemes. Simulation results show that our scheme improves the overall compression and recovery performance compared to other CS encryption schemes. Our scheme can be used to efficiently encrypt sensitive information in online database, virtual currency, Internet of Things (IoT) and cloud encryption systems.

[1]  Qi Wang,et al.  On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[2]  Aruna Seneviratne,et al.  Kryptein: A Compressive-Sensing-Based Encryption Scheme for the Internet of Things , 2017, 2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[3]  Sriram Vishwanath,et al.  Secrecy using compressive sensing , 2011, 2011 IEEE Information Theory Workshop.

[4]  E. Candès The restricted isometry property and its implications for compressed sensing , 2008 .

[5]  Hao Liang,et al.  Joint encryption and compressed sensing in smart grid data transmission , 2014, 2014 IEEE Global Communications Conference.

[6]  Matthew K. Franklin,et al.  An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.

[7]  Y. Rachlin,et al.  The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[8]  David L Donoho,et al.  Compressed sensing , 2006, IEEE Transactions on Information Theory.

[9]  Wen Hu,et al.  SimpleTrack: Adaptive Trajectory Compression With Deterministic Projection Matrix for Mobile Sensor Networks , 2014, IEEE Sensors Journal.

[10]  Yanfei Sun,et al.  A Hybrid Security and Compressive Sensing-Based Sensor Data Gathering Scheme , 2015, IEEE Access.

[11]  Emmanuel J. Candès,et al.  Decoding by linear programming , 2005, IEEE Transactions on Information Theory.

[12]  Hideki Imai,et al.  Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents , 2001, CT-RSA.

[13]  Brent Waters,et al.  Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.

[14]  H. Landau Sampling, data transmission, and the Nyquist rate , 1967 .

[15]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[16]  Christoph Ruland,et al.  Compressive Sensing encryption modes and their security , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).

[17]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[18]  Chun-Shien Lu,et al.  Privacy-preserving data collection and recovery of compressive sensing , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).

[19]  Cong Wang,et al.  A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[20]  Emmanuel J. Candès,et al.  Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.

[21]  Anupam Chattopadhyay,et al.  Secure and Lightweight Compressive Sensing Using Stream Cipher , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[22]  Meng Zhang,et al.  Energy-efficient and Secure Sensor Data Transmission Using Encompression , 2013, 2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems.