DOI QR코드

DOI QR Code

Secure and Scalable Key Aggregation Scheme for Cloud Storage

  • Park, YoHan (Kyungpook National University, Department of Electronics Engineering) ;
  • Park, YoungHo (Kyungpook National University, School of Electronics Engineering)
  • Received : 2014.11.03
  • Accepted : 2015.02.25
  • Published : 2015.04.30

Abstract

As the communication technology and mobile devices develop, the need for the efficient and secure remote storage is required. And recently, many companies support cloud storages to meet the requirements of the customers. Especially in the business field where various companies collaborate, data sharing is an essential functionality to enhance their work performance. However, existing researches have not fully satisfied the requirement either efficiency and security. This paper suggests efficient and secure data sharing scheme for cloud storage by using secret sharing scheme. Proposed scheme can be applied to business collaborations and team projects.

Keywords

References

  1. S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu, "SPICE-Simple Privacy-Preserving Identity-Management for Cloud Environment," ACNS 2012, LNCS 7341, pp. 526-543, 2012.
  2. U. Somani, K. Lakhani, and M. Mundra, "Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing," 2010 1st International Conference on Parallel, Distributed and Grid Computing, pp. 211-216, 2012.
  3. G. Zhaio, C. Rong, J. Li, F. Zhang, and Y. Tang, "Trusted Data Sharing over Untrusted Cloud Storage Providers," IEEE International Conference on Cloud Computing Technology and Science, pp. 97-103, 2010
  4. C.-K. Chu, S. S. M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, "Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage," IEEE Transactions on Parallel and Distributed Systems, Vol 25, No.2, pp. 468-477, 2014. https://doi.org/10.1109/TPDS.2013.112
  5. S. Kamara and K. Lauater, "Cryptographic Cloud Storage," Financial Cryptography and Data Security 2010, LNCS 6054, pp. 136-149, 2010.
  6. L. Arockiam1 and S. Monikandan, "Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm," International Journal of Advanced Research in Computer and Communication Engineering, Vol 2, No.8, pp. 3064-3070, 2013.
  7. A. Shamir, "How to share a secret," Communications of the ACM, Vol 22, No.11, pp. 612-613, 1979. https://doi.org/10.1145/359168.359176
  8. X. Cao, W. Kou, and X. Du, "A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges," Information Sciences, Vol. 180, No.15, pp. 2895-2903, 2010. https://doi.org/10.1016/j.ins.2010.04.002