ASDS: Attribute‐based secure data sharing scheme for reliable cloud environment

Cloud computing is a new revolution of information technology which provides many benefits to customers such as scalability, on‐demand, 24 × 7 × 365 support, and reduce cost usage of computing resources. But storing data on these untrusted cloud servers makes secure data sharing a big challenge issue. On one hand, enforce data access policies on these untrusted storage servers provider is an effective way to ensure data security. On the other hand, confidentiality of sensitive data should be protected against them. This paper presents an attribute‐based secure data sharing (ASDS) scheme for cloud environment, which provides data access control, data confidentiality, data authentication, and flexible user revocation. In addition, the proposed scheme is able to resist collusion attack and replay attack. The analysis of security properties and the comparison performance with other data sharing schemes have demonstrated that ASDS is very suitable for cloud environment.

[1]  Sushil Jajodia,et al.  Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.

[2]  Xiaohui Liang,et al.  An Efficient and Secure User Revocation Scheme in Mobile Social Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[3]  Prateek Mittal,et al.  EASiER: encryption-based access control in social networks with efficient revocation , 2011, ASIACCS '11.

[4]  Qian Wang,et al.  Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.

[5]  Vijay Varadharajan,et al.  Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Luis Rodero-Merino,et al.  A break in the clouds: towards a cloud definition , 2008, CCRV.

[7]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[8]  Athanasios V. Vasilakos,et al.  SeDaSC: Secure Data Sharing in Clouds , 2017, IEEE Systems Journal.

[9]  Junbeom Hur,et al.  Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.

[10]  Yanli Ren,et al.  Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations , 2015, Int. J. Distributed Sens. Networks.

[11]  Bert den Boer Diffie-Hellman is as Strong as Discrete Log for Certain Primes , 1988, CRYPTO.

[12]  Wen-Guey Tzeng,et al.  Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[13]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[14]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[15]  Shahaboddin Shamshirband,et al.  Incremental proxy re-encryption scheme for mobile cloud computing environment , 2013, The Journal of Supercomputing.

[16]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[17]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.

[18]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[19]  Athanasios V. Vasilakos,et al.  Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things , 2017, IEEE Cloud Computing.

[20]  Jengnan Tzeng,et al.  Re-Encryption Method Designed by Row Complete Matrix , 2012 .

[21]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[22]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[23]  Xiaohui Liang,et al.  Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.

[24]  Elisa Bertino,et al.  An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.