Skip to main content

2019 | OriginalPaper | Buchkapitel

An Efficient and Recoverable Data Sharing Mechanism for Edge Storage

verfasst von : Yuwen Pu, Ying Wang, Feihong Yang, Jin Luo, Chunqiang Hu, Haibo Hu

Erschienen in: Wireless Algorithms, Systems, and Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With data growing exponentially, more and more people prefer to share data with others by storing the data in edge servers. However, edge server cannot be deemed completely trustable as the sensitive data my be disclosed. Therefore, in this paper, we propose an efficient and secure data sharing scheme for edge storage by employing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) which can be utilized to conduct fine-grained control. This scheme can not only support data recovery when some edge servers break down by employing Secret Sharing Scheme, but also can support semi-trusted third party authority via employing re-encryption method. That is, the third party authority can not either reveal the private data stored in edge servers. Finally, we analyze security of our scheme to demonstrate that this scheme is resistant to eavesdropping attack and colluding attack. Additionally, relevant experiments results are shown that the scheme is feasibility and efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jeong, J.-S., Kim, M., Yoo, K.-H., et al.: A content oriented smart education system based on cloud computing. Int. J. Multimed. Ubiquit. Eng. 8(6), 313–328 (2013) Jeong, J.-S., Kim, M., Yoo, K.-H., et al.: A content oriented smart education system based on cloud computing. Int. J. Multimed. Ubiquit. Eng. 8(6), 313–328 (2013)
2.
Zurück zum Zitat Li, Y., Wu, C., Guo, L., Lee, C.-H., Guo, Y.: Wiki-health: a big data platform for health sensor data management. In: Cloud Computing Applications for Quality Health Care Delivery, pp. 59–77. IGI Global (2014) Li, Y., Wu, C., Guo, L., Lee, C.-H., Guo, Y.: Wiki-health: a big data platform for health sensor data management. In: Cloud Computing Applications for Quality Health Care Delivery, pp. 59–77. IGI Global (2014)
3.
Zurück zum Zitat Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., Chen, D.: OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In: 2013 Proceedings IEEE INFOCOM, pp. 2274–2282. IEEE (2013) Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., Chen, D.: OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In: 2013 Proceedings IEEE INFOCOM, pp. 2274–2282. IEEE (2013)
4.
Zurück zum Zitat Mach, P., Becvar, Z.: Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19(3), 1628–1656 (2017) Mach, P., Becvar, Z.: Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19(3), 1628–1656 (2017)
5.
Zurück zum Zitat Fu, J.-S., Liu, Y., Chao, H.-C., Bhargava, B.K., Zhang, Z.-J.: Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Ind. Inform. 14(10), 4519–4528 (2018) Fu, J.-S., Liu, Y., Chao, H.-C., Bhargava, B.K., Zhang, Z.-J.: Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Ind. Inform. 14(10), 4519–4528 (2018)
6.
Zurück zum Zitat Hu, C., Li, H., Huo, Y., Xiang, T., Liao, X.: Secure and efficient data communication protocol for wireless body area networks. IEEE Trans. Multi-scale Comput. Syst. 2(2), 94–107 (2016) Hu, C., Li, H., Huo, Y., Xiang, T., Liao, X.: Secure and efficient data communication protocol for wireless body area networks. IEEE Trans. Multi-scale Comput. Syst. 2(2), 94–107 (2016)
7.
Zurück zum Zitat He, Z., Cai, Z., Han, Q., Tong, W., Sun, L., Li, Y.: An energy efficient privacy-preserving content sharing scheme in mobile social networks. Pers. Ubiquit. Comput. 20(5), 833–846 (2016) He, Z., Cai, Z., Han, Q., Tong, W., Sun, L., Li, Y.: An energy efficient privacy-preserving content sharing scheme in mobile social networks. Pers. Ubiquit. Comput. 20(5), 833–846 (2016)
8.
Zurück zum Zitat Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1–9. IEEE (2017) Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1–9. IEEE (2017)
9.
Zurück zum Zitat Alrawais, A., Alhothaily, A., Yu, J., Hu, C., Cheng, X.: SecureGuard: a certificate validation system in public key infrastructure. IEEE Trans. Veh. Technol. 67(6), 5399–5408 (2018) Alrawais, A., Alhothaily, A., Yu, J., Hu, C., Cheng, X.: SecureGuard: a certificate validation system in public key infrastructure. IEEE Trans. Veh. Technol. 67(6), 5399–5408 (2018)
10.
Zurück zum Zitat Hu, C., Li, W., Cheng, X., Yu, J., Wang, S., Bie, R.: A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data 4(3), 341–355 (2018) Hu, C., Li, W., Cheng, X., Yu, J., Wang, S., Bie, R.: A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data 4(3), 341–355 (2018)
11.
Zurück zum Zitat Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE IoT J. 4(6), 1868–1878 (2017) Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE IoT J. 4(6), 1868–1878 (2017)
12.
Zurück zum Zitat Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013) Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)
13.
Zurück zum Zitat Varghese, S., Vigila, S.M.C.: A varied approach to attribute based access model for secure storage in cloud. In: 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1–4. IEEE (2017) Varghese, S., Vigila, S.M.C.: A varied approach to attribute based access model for secure storage in cloud. In: 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1–4. IEEE (2017)
14.
Zurück zum Zitat Lyu, M., Li, X., Li, H.: Efficient, verifiable and privacy preserving decentralized attribute-based encryption for mobile cloud computing. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 195–204. IEEE (2017) Lyu, M., Li, X., Li, H.: Efficient, verifiable and privacy preserving decentralized attribute-based encryption for mobile cloud computing. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 195–204. IEEE (2017)
15.
Zurück zum Zitat Yang, Y., Chen, X., Chen, H., Xuehui, D.: Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing. IEEE Access 6, 18009–18021 (2018) Yang, Y., Chen, X., Chen, H., Xuehui, D.: Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing. IEEE Access 6, 18009–18021 (2018)
16.
Zurück zum Zitat Green, M., Hohenberger, S., Waters, B., et al.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium, vol. 2011 (2011) Green, M., Hohenberger, S., Waters, B., et al.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium, vol. 2011 (2011)
17.
Zurück zum Zitat Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343–1354 (2013) Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343–1354 (2013)
18.
Zurück zum Zitat Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013) Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)
19.
Zurück zum Zitat Tian, W., Xu, H., Komi, M., Zhang, J.: Secure and flexible data sharing via ciphertext retrieval for cloud computing. In 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 161–166. IEEE (2017) Tian, W., Xu, H., Komi, M., Zhang, J.: Secure and flexible data sharing via ciphertext retrieval for cloud computing. In 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 161–166. IEEE (2017)
20.
Zurück zum Zitat Wang, T., Zhou, J., Chen, X., Wang, G., Liu, A., Liu, Y.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3–12 (2018) Wang, T., Zhou, J., Chen, X., Wang, G., Liu, A., Liu, Y.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3–12 (2018)
21.
Zurück zum Zitat Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007)
22.
Zurück zum Zitat Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979) Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Metadaten
Titel
An Efficient and Recoverable Data Sharing Mechanism for Edge Storage
verfasst von
Yuwen Pu
Ying Wang
Feihong Yang
Jin Luo
Chunqiang Hu
Haibo Hu
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-23597-0_20

Premium Partner