Skip to main content
Top

2019 | OriginalPaper | Chapter

An Efficient and Recoverable Data Sharing Mechanism for Edge Storage

Authors : Yuwen Pu, Ying Wang, Feihong Yang, Jin Luo, Chunqiang Hu, Haibo Hu

Published in: Wireless Algorithms, Systems, and Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With data growing exponentially, more and more people prefer to share data with others by storing the data in edge servers. However, edge server cannot be deemed completely trustable as the sensitive data my be disclosed. Therefore, in this paper, we propose an efficient and secure data sharing scheme for edge storage by employing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) which can be utilized to conduct fine-grained control. This scheme can not only support data recovery when some edge servers break down by employing Secret Sharing Scheme, but also can support semi-trusted third party authority via employing re-encryption method. That is, the third party authority can not either reveal the private data stored in edge servers. Finally, we analyze security of our scheme to demonstrate that this scheme is resistant to eavesdropping attack and colluding attack. Additionally, relevant experiments results are shown that the scheme is feasibility and efficiency.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jeong, J.-S., Kim, M., Yoo, K.-H., et al.: A content oriented smart education system based on cloud computing. Int. J. Multimed. Ubiquit. Eng. 8(6), 313–328 (2013) Jeong, J.-S., Kim, M., Yoo, K.-H., et al.: A content oriented smart education system based on cloud computing. Int. J. Multimed. Ubiquit. Eng. 8(6), 313–328 (2013)
2.
go back to reference Li, Y., Wu, C., Guo, L., Lee, C.-H., Guo, Y.: Wiki-health: a big data platform for health sensor data management. In: Cloud Computing Applications for Quality Health Care Delivery, pp. 59–77. IGI Global (2014) Li, Y., Wu, C., Guo, L., Lee, C.-H., Guo, Y.: Wiki-health: a big data platform for health sensor data management. In: Cloud Computing Applications for Quality Health Care Delivery, pp. 59–77. IGI Global (2014)
3.
go back to reference Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., Chen, D.: OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In: 2013 Proceedings IEEE INFOCOM, pp. 2274–2282. IEEE (2013) Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., Chen, D.: OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In: 2013 Proceedings IEEE INFOCOM, pp. 2274–2282. IEEE (2013)
4.
go back to reference Mach, P., Becvar, Z.: Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19(3), 1628–1656 (2017) Mach, P., Becvar, Z.: Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19(3), 1628–1656 (2017)
5.
go back to reference Fu, J.-S., Liu, Y., Chao, H.-C., Bhargava, B.K., Zhang, Z.-J.: Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Ind. Inform. 14(10), 4519–4528 (2018) Fu, J.-S., Liu, Y., Chao, H.-C., Bhargava, B.K., Zhang, Z.-J.: Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Ind. Inform. 14(10), 4519–4528 (2018)
6.
go back to reference Hu, C., Li, H., Huo, Y., Xiang, T., Liao, X.: Secure and efficient data communication protocol for wireless body area networks. IEEE Trans. Multi-scale Comput. Syst. 2(2), 94–107 (2016) Hu, C., Li, H., Huo, Y., Xiang, T., Liao, X.: Secure and efficient data communication protocol for wireless body area networks. IEEE Trans. Multi-scale Comput. Syst. 2(2), 94–107 (2016)
7.
go back to reference He, Z., Cai, Z., Han, Q., Tong, W., Sun, L., Li, Y.: An energy efficient privacy-preserving content sharing scheme in mobile social networks. Pers. Ubiquit. Comput. 20(5), 833–846 (2016) He, Z., Cai, Z., Han, Q., Tong, W., Sun, L., Li, Y.: An energy efficient privacy-preserving content sharing scheme in mobile social networks. Pers. Ubiquit. Comput. 20(5), 833–846 (2016)
8.
go back to reference Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1–9. IEEE (2017) Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1–9. IEEE (2017)
9.
go back to reference Alrawais, A., Alhothaily, A., Yu, J., Hu, C., Cheng, X.: SecureGuard: a certificate validation system in public key infrastructure. IEEE Trans. Veh. Technol. 67(6), 5399–5408 (2018) Alrawais, A., Alhothaily, A., Yu, J., Hu, C., Cheng, X.: SecureGuard: a certificate validation system in public key infrastructure. IEEE Trans. Veh. Technol. 67(6), 5399–5408 (2018)
10.
go back to reference Hu, C., Li, W., Cheng, X., Yu, J., Wang, S., Bie, R.: A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data 4(3), 341–355 (2018) Hu, C., Li, W., Cheng, X., Yu, J., Wang, S., Bie, R.: A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data 4(3), 341–355 (2018)
11.
go back to reference Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE IoT J. 4(6), 1868–1878 (2017) Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE IoT J. 4(6), 1868–1878 (2017)
12.
go back to reference Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013) Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)
13.
go back to reference Varghese, S., Vigila, S.M.C.: A varied approach to attribute based access model for secure storage in cloud. In: 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1–4. IEEE (2017) Varghese, S., Vigila, S.M.C.: A varied approach to attribute based access model for secure storage in cloud. In: 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1–4. IEEE (2017)
14.
go back to reference Lyu, M., Li, X., Li, H.: Efficient, verifiable and privacy preserving decentralized attribute-based encryption for mobile cloud computing. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 195–204. IEEE (2017) Lyu, M., Li, X., Li, H.: Efficient, verifiable and privacy preserving decentralized attribute-based encryption for mobile cloud computing. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 195–204. IEEE (2017)
15.
go back to reference Yang, Y., Chen, X., Chen, H., Xuehui, D.: Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing. IEEE Access 6, 18009–18021 (2018) Yang, Y., Chen, X., Chen, H., Xuehui, D.: Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing. IEEE Access 6, 18009–18021 (2018)
16.
go back to reference Green, M., Hohenberger, S., Waters, B., et al.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium, vol. 2011 (2011) Green, M., Hohenberger, S., Waters, B., et al.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium, vol. 2011 (2011)
17.
go back to reference Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343–1354 (2013) Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343–1354 (2013)
18.
go back to reference Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013) Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)
19.
go back to reference Tian, W., Xu, H., Komi, M., Zhang, J.: Secure and flexible data sharing via ciphertext retrieval for cloud computing. In 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 161–166. IEEE (2017) Tian, W., Xu, H., Komi, M., Zhang, J.: Secure and flexible data sharing via ciphertext retrieval for cloud computing. In 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 161–166. IEEE (2017)
20.
go back to reference Wang, T., Zhou, J., Chen, X., Wang, G., Liu, A., Liu, Y.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3–12 (2018) Wang, T., Zhou, J., Chen, X., Wang, G., Liu, A., Liu, Y.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3–12 (2018)
21.
go back to reference Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007)
22.
go back to reference Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979) Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Metadata
Title
An Efficient and Recoverable Data Sharing Mechanism for Edge Storage
Authors
Yuwen Pu
Ying Wang
Feihong Yang
Jin Luo
Chunqiang Hu
Haibo Hu
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-23597-0_20

Premium Partner