Skip to main content
Erschienen in: Soft Computing 3/2020

09.05.2019 | Methodologies and Application

Data sharing using proxy re-encryption based on DNA computing

verfasst von: Ahmed Elhadad

Erschienen in: Soft Computing | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud data sharing allows users to access data stored on the web object. Security and protecting cloud data sharing form different attacks is recently considered one of the most challenges. In this paper, we are proposing a framework for cloud data sharing protection against unauthorized access. The proposed framework is based on DNA-proxy re-encryption. Firstly, three keys are generated for the owner, proxy and the user who need to access the data. Then, the owner stores his data encrypted on the cloud using his key. If the user wants to access this data then he can access it via the proxy after re-encrypting using the second generated key for the proxy. Finally, the user can decrypt the re-encrypted data with the third generated key. The framework was implemented using various plaintext files and real DNA sequences. The experimental results show that the framework has an outstanding performance in terms of execution time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, BerlinCrossRef Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, BerlinCrossRef
Zurück zum Zitat Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773CrossRef Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773CrossRef
Zurück zum Zitat Abualigah LM, Khader AT, Hanandeh ES (2018) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047CrossRef Abualigah LM, Khader AT, Hanandeh ES (2018) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047CrossRef
Zurück zum Zitat Ali SH (2012a) A novel tool (FP-KC) for handle the three main dimensions reduction and association rule mining. In: 2012 6th International conference on sciences of electronics, technologies of information and telecommunications (SETIT) (IEEE), pp 951–961 Ali SH (2012a) A novel tool (FP-KC) for handle the three main dimensions reduction and association rule mining. In: 2012 6th International conference on sciences of electronics, technologies of information and telecommunications (SETIT) (IEEE), pp 951–961
Zurück zum Zitat Ali SH (2012b) Miner for OACCR: case of medical data analysis in knowledge discovery. In: 2012 6th International conference on sciences of electronics, technologies of information and telecommunications (SETIT) (IEEE), pp 962–975 Ali SH (2012b) Miner for OACCR: case of medical data analysis in knowledge discovery. In: 2012 6th International conference on sciences of electronics, technologies of information and telecommunications (SETIT) (IEEE), pp 962–975
Zurück zum Zitat Ali SH (2013) Novel approach for generating the key of stream cipher system using random forest data mining algorithm. In: 2013 Sixth international conference on developments in eSystems engineering (IEEE), pp 259–269 Ali SH (2013) Novel approach for generating the key of stream cipher system using random forest data mining algorithm. In: 2013 Sixth international conference on developments in eSystems engineering (IEEE), pp 259–269
Zurück zum Zitat Al-Janabi S (2017) Pragmatic miner to risk analysis for intrusion detection (PMRA-ID). In: International conference on soft computing in data science. Springer, pp 263–277 Al-Janabi S (2017) Pragmatic miner to risk analysis for intrusion detection (PMRA-ID). In: International conference on soft computing in data science. Springer, pp 263–277
Zurück zum Zitat Al-Janabi S, Al-Shourbaji I (2016) A study of cyber security awareness in educational environment in the middle east. J Inf Knowl Manag 15(01):1650007CrossRef Al-Janabi S, Al-Shourbaji I (2016) A study of cyber security awareness in educational environment in the middle east. J Inf Knowl Manag 15(01):1650007CrossRef
Zurück zum Zitat Al-Janabi S, Patel A, Fatlawi H, Kalajdzic K, Al Shourbaji I (2014) Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments. In: 2014 International congress on technology, communication and knowledge (ICTCK) (IEEE), pp 1–8 Al-Janabi S, Patel A, Fatlawi H, Kalajdzic K, Al Shourbaji I (2014) Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments. In: 2014 International congress on technology, communication and knowledge (ICTCK) (IEEE), pp 1–8
Zurück zum Zitat Al-Janabi S, Al-Shourbaji I, Shojafar M, Shamshirband S (2017) Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt Inform J 18(2):113CrossRef Al-Janabi S, Al-Shourbaji I, Shojafar M, Shamshirband S (2017) Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt Inform J 18(2):113CrossRef
Zurück zum Zitat Ansi X (2010) 98: Lattice-based polynomial public key establishment algorithm for the financial services industry. Technical report, ANSI Ansi X (2010) 98: Lattice-based polynomial public key establishment algorithm for the financial services industry. Technical report, ANSI
Zurück zum Zitat Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9(1):1CrossRef Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9(1):1CrossRef
Zurück zum Zitat Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 127–144 Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 127–144
Zurück zum Zitat Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I (2009) Above the clouds: a Berkeley view of cloud computing. Department of Electrical Engineering and Computer Science, University of California, Berkeley, Report UCB/EECS 28(13), 2009 Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I (2009) Above the clouds: a Berkeley view of cloud computing. Department of Electrical Engineering and Computer Science, University of California, Berkeley, Report UCB/EECS 28(13), 2009
Zurück zum Zitat Galibus T, Krasnoproshin VV, de Oliveira Albuquerque R, de Freitas EP (2016) Elements of cloud storage security: concepts, designs and optimized practices. Springer, BerlinCrossRef Galibus T, Krasnoproshin VV, de Oliveira Albuquerque R, de Freitas EP (2016) Elements of cloud storage security: concepts, designs and optimized practices. Springer, BerlinCrossRef
Zurück zum Zitat Green M, Ateniese G (2007) Identity-based proxy re-encryption. In: International conference on applied cryptography and network security. Springer, pp 288–306 Green M, Ateniese G (2007) Identity-based proxy re-encryption. In: International conference on applied cryptography and network security. Springer, pp 288–306
Zurück zum Zitat Hoffstein J, Pipher J, Silverman JH (1998) NTRU: a ring-based public key cryptosystem. In: International algorithmic number theory symposium. Springer, pp 267–288 Hoffstein J, Pipher J, Silverman JH (1998) NTRU: a ring-based public key cryptosystem. In: International algorithmic number theory symposium. Springer, pp 267–288
Zurück zum Zitat Ivan AA, Dodis Y (2003) Proxy cryptography revisited. In: NDSS Ivan AA, Dodis Y (2003) Proxy cryptography revisited. In: NDSS
Zurück zum Zitat Josep AD, Katz R, Konwinski A, Gunho L, Patterson D, Rabkin A (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef Josep AD, Katz R, Konwinski A, Gunho L, Patterson D, Rabkin A (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef
Zurück zum Zitat Kalbi S, Fallah A, Bettinger P, Shataee S, Yousefpour R (2018) Mixed-effects modeling for tree height prediction models of Oriental beech in the Hyrcanian forests. J For Res 29(5):1195CrossRef Kalbi S, Fallah A, Bettinger P, Shataee S, Yousefpour R (2018) Mixed-effects modeling for tree height prediction models of Oriental beech in the Hyrcanian forests. J For Res 29(5):1195CrossRef
Zurück zum Zitat Li H, Yin SL, Zhao C, Teng L (2017) A proxy re-encryption scheme based on elliptic curve group. J Inf Hiding Multimed Signal Process 8(1):218 Li H, Yin SL, Zhao C, Teng L (2017) A proxy re-encryption scheme based on elliptic curve group. J Inf Hiding Multimed Signal Process 8(1):218
Zurück zum Zitat Mo L, Yao G (2013) Multi-use conditional proxy re-encryption. In: 2013 International conference on information science and cloud computing companion. IEEE, pp 246–251 Mo L, Yao G (2013) Multi-use conditional proxy re-encryption. In: 2013 International conference on information science and cloud computing companion. IEEE, pp 246–251
Zurück zum Zitat Nepal S, Pathan M (2014) Security, privacy and trust in cloud systems. Springer, BerlinCrossRef Nepal S, Pathan M (2014) Security, privacy and trust in cloud systems. Springer, BerlinCrossRef
Zurück zum Zitat Nuñez D, Agudo I, Lopez J (2015) NTRUReEncrypt: an efficient proxy re-encryption scheme based on NTRU. In: Proceedings of the 10th ACM symposium on information, computer and communications security. ACM, pp 179–189 Nuñez D, Agudo I, Lopez J (2015) NTRUReEncrypt: an efficient proxy re-encryption scheme based on NTRU. In: Proceedings of the 10th ACM symposium on information, computer and communications security. ACM, pp 179–189
Zurück zum Zitat Patel A, Al-Janabi S, AlShourbaji I, Pedersen J (2015) A novel methodology towards a trusted environment in mashup web applications. Comput Secur 49:107CrossRef Patel A, Al-Janabi S, AlShourbaji I, Pedersen J (2015) A novel methodology towards a trusted environment in mashup web applications. Comput Secur 49:107CrossRef
Zurück zum Zitat Polyakov Y, Rohloff K, Sahu G, Vaikuntanathan V (2017) Fast proxy re-encryption for publish/subscribe systems. ACM Trans Priv Secur (TOPS) 20(4):14 Polyakov Y, Rohloff K, Sahu G, Vaikuntanathan V (2017) Fast proxy re-encryption for publish/subscribe systems. ACM Trans Priv Secur (TOPS) 20(4):14
Zurück zum Zitat Sepehri M, Cimato S, Damiani E, Yeun CY (2015) Data sharing on the cloud: a scalable proxy-based protocol for privacy-preserving queries. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol 1. IEEE, pp 1357–1362 Sepehri M, Cimato S, Damiani E, Yeun CY (2015) Data sharing on the cloud: a scalable proxy-based protocol for privacy-preserving queries. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol 1. IEEE, pp 1357–1362
Zurück zum Zitat Sepehri M, Cimato S, Damiani E (2017) Efficient implementation of a proxy-based protocol for data sharing on the cloud. In: Proceedings of the fifth ACM international workshop on security in cloud computing. ACM, pp 67–74 Sepehri M, Cimato S, Damiani E (2017) Efficient implementation of a proxy-based protocol for data sharing on the cloud. In: Proceedings of the fifth ACM international workshop on security in cloud computing. ACM, pp 67–74
Zurück zum Zitat Sun M, Ge C, Fang L, Wang J (2018) A proxy broadcast re-encryption for cloud data sharing. Multimed Tools Appl 77(9):10455CrossRef Sun M, Ge C, Fang L, Wang J (2018) A proxy broadcast re-encryption for cloud data sharing. Multimed Tools Appl 77(9):10455CrossRef
Zurück zum Zitat Thangam V, Chandrasekaran K (2016) Elliptic curve based proxy re-encryption. In: Proceedings of the second international conference on information and communication technology for competitive strategies. ACM, p 121 Thangam V, Chandrasekaran K (2016) Elliptic curve based proxy re-encryption. In: Proceedings of the second international conference on information and communication technology for competitive strategies. ACM, p 121
Zurück zum Zitat Wan J, Lin K, Zeng D, Li J, Xiang Y, Liao X, Huang J, Liu Z (eds) (2018) Cloud computing, security, privacy in new computing environments. In: Proceedings of 7th international conference, cloudcomp 2016 and first international conference, SPNCE 2016, Guangzhou, China. https://doi.org/10.1007/978-3-319-69605-8 Wan J, Lin K, Zeng D, Li J, Xiang Y, Liao X, Huang J, Liu Z (eds) (2018) Cloud computing, security, privacy in new computing environments. In: Proceedings of 7th international conference, cloudcomp 2016 and first international conference, SPNCE 2016, Guangzhou, China. https://​doi.​org/​10.​1007/​978-3-319-69605-8
Zurück zum Zitat Zhao H, Bai P, Peng Y, Xu R (2018) Efficient key management scheme for health blockchain. CAAI Trans Intell Technol 3(2):114CrossRef Zhao H, Bai P, Peng Y, Xu R (2018) Efficient key management scheme for health blockchain. CAAI Trans Intell Technol 3(2):114CrossRef
Metadaten
Titel
Data sharing using proxy re-encryption based on DNA computing
verfasst von
Ahmed Elhadad
Publikationsdatum
09.05.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 3/2020
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04041-z

Weitere Artikel der Ausgabe 3/2020

Soft Computing 3/2020 Zur Ausgabe