DOI QR코드

DOI QR Code

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage

  • Lee, Sun-Ho (Dept. of Computer Software Engineering, Soonchunhyang University) ;
  • Lee, Im-Yeong (Dept. of Computer Software Engineering, Soonchunhyang University)
  • Received : 2012.05.24
  • Accepted : 2012.10.25
  • Published : 2013.06.29

Abstract

Cloud storage is provided as a service in order to keep pace with the increasing use of digital information. It can be used to store data via networks and various devices and is easy to access. Unlike existing removable storage, many users can use cloud storage because it has no storage capacity limit and does not require a storage medium. Cloud storage reliability has become a topic of importance, as many users employ it for saving great volumes of data. For protection against unethical administrators and attackers, a variety of cryptography systems, such as searchable encryption and proxy re-encryption, are being applied to cloud storage systems. However, the existing searchable encryption technology is inconvenient to use in a cloud storage environment where users upload their data. This is because this data is shared with others, as necessary, and the users with whom the data is shared change frequently. In this paper, we propose a searchable re-encryption scheme in which a user can safely share data with others by generating a searchable encryption index and then re-encrypt it.

Keywords

References

  1. D. X. Song, D. Wagner and A. Perrig, "Practical Techniques for Searching on Encrypted Data," Symposium on Security and Privacy, California, USA, May, 2000, pp.14-17.
  2. E. J. Goh, "Secure Indexes," ePrint Crpytography Archive, 2004.
  3. R. Curtmola, J. Garay, S. Kamara and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proceedings of the 13th ACM conference on Computer and communications security, Virginia, USA, October, 2006.
  4. D. Boneh, G. Crescenzo, R. Ostrovsky and G. Persiano, "Public Key Encryption with Keyword Search," Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May, 2004.
  5. D. Boneh and B. Waters, Conjunctive, "Subset and Range Queries on Encrypted Data," Proceedings of the 4th Theory of Cryptography Conference, Amsterdam, Netherlands, Febraury, 2007.
  6. Y. H. Hwang and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," Proceeding of First International Conference on Pairing-Based Cryptog-raphy, Tokyo, Japan, July, 2007.
  7. F. Bao, R. H. Deng, X. Ding, and Y. Yang, "Private Query on Encrypted Data in Multi-User Set-tings," Proceeding of the 4th international conference on Information security practice and experi-ence, Sydney, Australia, April, 2008.
  8. Kamara, S. and Lauter. K., "Cryptographic Cloud Storage," Proceedings of Workshops on Financial Cryptography and Data Security, Canary Islands, Spain, January, 2010.
  9. Ion, M., Russello, G. and Crispo, B., "Enforcing Multi-user Access Policies to Encrypted Cloud Da-tabases," International Symposium on Policies for Distributed Systems and Networks, Trento, Italy, June, 2011.
  10. B. Zhang, and F. Zhang, "An efficient public key encryption with conjunctive-subset keywords search," Journal of Network and Computer Applications. Vol 34, No.1, 2011.
  11. Y. Yang, "Towards Multi-user Private Keyword Search for Cloud Computing," Proceeding of Inter-national Conference on Cloud Computing, Singapore, Singapore, July, 2011.
  12. Chen, X., Li, Y., "Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Stor-age," I.J. Computer Network and Information Security. Vol.3, No.2, 2011.
  13. S. Ghemawat, H. Gobioff, and S. Leung, "The Google File System," Proceedings of the nineteenth ACM symposium on Operating systems principles, Newyork, USA, December, 2003.
  14. D Borthakur, "The Hadoop Distributed File Aystem: Architecture and Design," http://svn.apache.org/repos/asf/hadoop/common/tags/release-0.16.1/docs/hdfs_design.pdf

Cited by

  1. Digital forensics investigation methodology applicable for social network services vol.74, pp.14, 2015, https://doi.org/10.1007/s11042-014-2061-8
  2. Efficient auto-scaling scheme for rapid storage service using many-core of desktop storage virtualization based on IoT vol.209, 2016, https://doi.org/10.1016/j.neucom.2016.05.090
  3. Efficiency Sustainability Resource Visual Simulator for Clustered Desktop Virtualization Based on Cloud Infrastructure vol.6, pp.11, 2014, https://doi.org/10.3390/su6118079
  4. Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage vol.5, pp.1, 2015, https://doi.org/10.1186/s13673-015-0039-9
  5. G-Cloud Monitor: A Cloud Monitoring System for Factory Automation for Sustainable Green Computing vol.6, pp.12, 2014, https://doi.org/10.3390/su6128510
  6. Human-centric storage resource mechanism for big data on cloud service architecture vol.72, pp.7, 2016, https://doi.org/10.1007/s11227-015-1390-3
  7. A shareable keyword search over encrypted data in cloud computing 2015, https://doi.org/10.1007/s11227-015-1515-8
  8. Construction of Dynamic Medical Information System for Digital Hospital Environments vol.91, pp.4, 2016, https://doi.org/10.1007/s11277-015-3110-y
  9. Framework of Resource Management for Intercloud Computing vol.2014, 2014, https://doi.org/10.1155/2014/108286
  10. Efficient Sustainable Operation Mechanism of Distributed Desktop Integration Storage Based on Virtualization with Ubiquitous Computing vol.7, pp.6, 2015, https://doi.org/10.3390/su7067568
  11. Performance Improvement of Database Compression for OLTP Workloads vol.E97.D, pp.4, 2014, https://doi.org/10.1587/transinf.E97.D.976
  12. Individual learner big data based cloud role player game learning vol.21, 2017, https://doi.org/10.3233/IDA-170871
  13. The development of a medical image information system environment using data synchronization based on cloud computing vol.75, pp.23, 2016, https://doi.org/10.1007/s11042-015-2506-8
  14. Real-Time Terrain Storage Generation from Multiple Sensors towards Mobile Robot Operation Interface vol.2014, 2014, https://doi.org/10.1155/2014/769149
  15. Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing vol.91, pp.4, 2016, https://doi.org/10.1007/s11277-015-3121-8
  16. Evaluation and design of function for tracing diffusion of classified information for file operations with KVM vol.72, pp.5, 2016, https://doi.org/10.1007/s11227-016-1671-5
  17. Design and implementation of a Bloom filter-based data deduplication algorithm for efficient data management pp.1868-5145, 2018, https://doi.org/10.1007/s12652-018-0893-1
  18. Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain vol.8, pp.1, 2018, https://doi.org/10.1186/s13673-018-0136-7