Browse > Article
http://dx.doi.org/10.3745/JIPS.2013.9.2.287

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage  

Lee, Sun-Ho (Dept. of Computer Software Engineering, Soonchunhyang University)
Lee, Im-Yeong (Dept. of Computer Software Engineering, Soonchunhyang University)
Publication Information
Journal of Information Processing Systems / v.9, no.2, 2013 , pp. 287-300 More about this Journal
Abstract
Cloud storage is provided as a service in order to keep pace with the increasing use of digital information. It can be used to store data via networks and various devices and is easy to access. Unlike existing removable storage, many users can use cloud storage because it has no storage capacity limit and does not require a storage medium. Cloud storage reliability has become a topic of importance, as many users employ it for saving great volumes of data. For protection against unethical administrators and attackers, a variety of cryptography systems, such as searchable encryption and proxy re-encryption, are being applied to cloud storage systems. However, the existing searchable encryption technology is inconvenient to use in a cloud storage environment where users upload their data. This is because this data is shared with others, as necessary, and the users with whom the data is shared change frequently. In this paper, we propose a searchable re-encryption scheme in which a user can safely share data with others by generating a searchable encryption index and then re-encrypt it.
Keywords
Searchable Encryption; Proxy Re-Encryption; Index Management; Cloud Computing; Cloud Storage;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. X. Song, D. Wagner and A. Perrig, "Practical Techniques for Searching on Encrypted Data," Symposium on Security and Privacy, California, USA, May, 2000, pp.14-17.
2 E. J. Goh, "Secure Indexes," ePrint Crpytography Archive, 2004.
3 R. Curtmola, J. Garay, S. Kamara and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proceedings of the 13th ACM conference on Computer and communications security, Virginia, USA, October, 2006.
4 D. Boneh, G. Crescenzo, R. Ostrovsky and G. Persiano, "Public Key Encryption with Keyword Search," Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May, 2004.
5 D. Boneh and B. Waters, Conjunctive, "Subset and Range Queries on Encrypted Data," Proceedings of the 4th Theory of Cryptography Conference, Amsterdam, Netherlands, Febraury, 2007.
6 Y. H. Hwang and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," Proceeding of First International Conference on Pairing-Based Cryptog-raphy, Tokyo, Japan, July, 2007.
7 F. Bao, R. H. Deng, X. Ding, and Y. Yang, "Private Query on Encrypted Data in Multi-User Set-tings," Proceeding of the 4th international conference on Information security practice and experi-ence, Sydney, Australia, April, 2008.
8 Kamara, S. and Lauter. K., "Cryptographic Cloud Storage," Proceedings of Workshops on Financial Cryptography and Data Security, Canary Islands, Spain, January, 2010.
9 Ion, M., Russello, G. and Crispo, B., "Enforcing Multi-user Access Policies to Encrypted Cloud Da-tabases," International Symposium on Policies for Distributed Systems and Networks, Trento, Italy, June, 2011.
10 B. Zhang, and F. Zhang, "An efficient public key encryption with conjunctive-subset keywords search," Journal of Network and Computer Applications. Vol 34, No.1, 2011.
11 Y. Yang, "Towards Multi-user Private Keyword Search for Cloud Computing," Proceeding of Inter-national Conference on Cloud Computing, Singapore, Singapore, July, 2011.
12 Chen, X., Li, Y., "Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Stor-age," I.J. Computer Network and Information Security. Vol.3, No.2, 2011.
13 S. Ghemawat, H. Gobioff, and S. Leung, "The Google File System," Proceedings of the nineteenth ACM symposium on Operating systems principles, Newyork, USA, December, 2003.
14 D Borthakur, "The Hadoop Distributed File Aystem: Architecture and Design," http://svn.apache.org/repos/asf/hadoop/common/tags/release-0.16.1/docs/hdfs_design.pdf