Skip to main content
Erschienen in: Soft Computing 23/2018

01.08.2018 | Focus

Efficient and secure big data storage system with leakage resilience in cloud computing

verfasst von: Yinghui Zhang, Menglei Yang, Dong Zheng, Pengzhen Lang, Axin Wu, Chen Chen

Erschienen in: Soft Computing | Ausgabe 23/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With recent advancements in wireless smart terminal manufacture and communication technologies, a huge amount of data are generated from a variety of sources including software applications and hardware devices. To make the most of big data, cloud computing can be exploited to store, share, and process the data. However, data privacy issues are still significantly challenging in practice where users’ secrets may be leaked because of diverse software vulnerabilities and hardware attacks. In this paper, to address the above security challenge of big data, we propose an efficient and secure big data storage system in cloud computing, in which a leakage-resilient encryption scheme serves as the main ingredient. What’s more, our formal security proofs analysis indicates that the proposed scheme can ensure users’ data privacy even if the partial key is leaked in cloud computing. Finally, the leakage resilience analysis indicates that the leakage ratio in our scheme can reach roughly 1/3 and is higher than other schemes. Performance comparisons show the practicability of our scheme for big data security in cloud computing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Akavia A, Goldwasser S, Vaikuntanathan V (2009) Simultaneous hardcore bits and cryptography against memory attacks. In: Theory of cryptography conference, pp 474–495CrossRef Akavia A, Goldwasser S, Vaikuntanathan V (2009) Simultaneous hardcore bits and cryptography against memory attacks. In: Theory of cryptography conference, pp 474–495CrossRef
Zurück zum Zitat Alwen J, Dodis Y, Wichs D (2009) Leakage-resilient public-key cryptography in the bounded-retrieval model. In: International cryptology conference on advances in cryptology, pp 36–54CrossRef Alwen J, Dodis Y, Wichs D (2009) Leakage-resilient public-key cryptography in the bounded-retrieval model. In: International cryptology conference on advances in cryptology, pp 36–54CrossRef
Zurück zum Zitat Berti F, Pereira O, Peters T, Standaert FX (2017) On leakage-resilient authenticated encryption with decryption leakages. IACR Trans Symmetric Cryptol 2017(3):271–293 Berti F, Pereira O, Peters T, Standaert FX (2017) On leakage-resilient authenticated encryption with decryption leakages. IACR Trans Symmetric Cryptol 2017(3):271–293
Zurück zum Zitat Brakerski Z, Kalai Y, Katz J, Vaikuntanathan V (2010) Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: IEEE symposium on foundations of computer science, pp 501–510 Brakerski Z, Kalai Y, Katz J, Vaikuntanathan V (2010) Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: IEEE symposium on foundations of computer science, pp 501–510
Zurück zum Zitat Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195MathSciNetCrossRef Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195MathSciNetCrossRef
Zurück zum Zitat Dodis Y, Haralambiev K, Lopez-Alt A, Wichs D (2010) Cryptography against continuous memory attacks. In: Foundations of computer science, pp 511–520 Dodis Y, Haralambiev K, Lopez-Alt A, Wichs D (2010) Cryptography against continuous memory attacks. In: Foundations of computer science, pp 511–520
Zurück zum Zitat Dodis Y, Lewko A, Waters B, Wichs D (2011) Storing secrets on continually leaky devices. In: Foundations of computer science, pp 688–697 Dodis Y, Lewko A, Waters B, Wichs D (2011) Storing secrets on continually leaky devices. In: Foundations of computer science, pp 688–697
Zurück zum Zitat Dziembowski S, Pietrzak K (2008) Leakage-resilient cryptography. In: IEEE symposium on foundations of computer science, pp. 293–302 Dziembowski S, Pietrzak K (2008) Leakage-resilient cryptography. In: IEEE symposium on foundations of computer science, pp. 293–302
Zurück zum Zitat Gandolfi K, Mourtel C, Olivier F (2001) Electromagnetic analysis: concrete results. Lecture Notes Comput Sci 2162:251–261CrossRef Gandolfi K, Mourtel C, Olivier F (2001) Electromagnetic analysis: concrete results. Lecture Notes Comput Sci 2162:251–261CrossRef
Zurück zum Zitat Gao Cz, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack. Inf Sci 444:72–88MathSciNetCrossRef Gao Cz, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack. Inf Sci 444:72–88MathSciNetCrossRef
Zurück zum Zitat Goldwasser S, Rothblum GN (2010) Securing computation against continuous leakage. In: Conference on advances in cryptology, pp 59–79CrossRef Goldwasser S, Rothblum GN (2010) Securing computation against continuous leakage. In: Conference on advances in cryptology, pp 59–79CrossRef
Zurück zum Zitat Gupta BB (2015) Editorial (thematic issue: cyber security, privacy and forensics for complex systems). Int J Sens Wirel Commun Control 5(1):2CrossRef Gupta BB (2015) Editorial (thematic issue: cyber security, privacy and forensics for complex systems). Int J Sens Wirel Commun Control 5(1):2CrossRef
Zurück zum Zitat Gupta S, Gupta BB (2016) An infrastructure-based framework for the alleviation of javascript worms from osn in mobile cloud platforms. In: International conference on network and system security, Springer, pp 98–109 Gupta S, Gupta BB (2016) An infrastructure-based framework for the alleviation of javascript worms from osn in mobile cloud platforms. In: International conference on network and system security, Springer, pp 98–109
Zurück zum Zitat Gupta B, Yamaguchi S, Agrawal DP (2018) Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimed Tools Appl 77(7):9203–9208CrossRef Gupta B, Yamaguchi S, Agrawal DP (2018) Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimed Tools Appl 77(7):9203–9208CrossRef
Zurück zum Zitat Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412:223–241CrossRef Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412:223–241CrossRef
Zurück zum Zitat Li S, Zhang F (2013) Leakage-resilient identity-based encryption scheme. Int J Grid Utility Comput 4(2/3):187–196CrossRef Li S, Zhang F (2013) Leakage-resilient identity-based encryption scheme. Int J Grid Utility Comput 4(2/3):187–196CrossRef
Zurück zum Zitat Li J, Chen X, Huang X, Tang S, Xiang Y, Hassan MM, Alelaiwi A (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579MathSciNetCrossRef Li J, Chen X, Huang X, Tang S, Xiang Y, Hassan MM, Alelaiwi A (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579MathSciNetCrossRef
Zurück zum Zitat Li J, Teng M, Zhang Y, Yu Q (2016) A leakage-resilient cca-secure identity-based encryption scheme. Comput J 59(7):1066–1075MathSciNetCrossRef Li J, Teng M, Zhang Y, Yu Q (2016) A leakage-resilient cca-secure identity-based encryption scheme. Comput J 59(7):1066–1075MathSciNetCrossRef
Zurück zum Zitat Li J, Yu Q, Zhang Y (2017) Identity-based broadcast encryption with continuous leakage resilience. Inf Sci 429:177–193MathSciNetCrossRef Li J, Yu Q, Zhang Y (2017) Identity-based broadcast encryption with continuous leakage resilience. Inf Sci 429:177–193MathSciNetCrossRef
Zurück zum Zitat Li J, Chen X, Chow SS, Huang Q, Wong DS, Liu Z (2018a) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96CrossRef Li J, Chen X, Chow SS, Huang Q, Wong DS, Liu Z (2018a) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96CrossRef
Zurück zum Zitat Li J, Zhang Y, Chen X, Xiang Y (2018b) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12CrossRef Li J, Zhang Y, Chen X, Xiang Y (2018b) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12CrossRef
Zurück zum Zitat Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018c) Privacy-preserving machine learning with multiple data providers. Future Gener Comput Syst 87:341–350CrossRef Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018c) Privacy-preserving machine learning with multiple data providers. Future Gener Comput Syst 87:341–350CrossRef
Zurück zum Zitat Li T, Li J, Liu Z, Li P, Jia C (2018d) Differentially private naive bayes learning over multiple data sources. Inf Sci 444:89–104MathSciNetCrossRef Li T, Li J, Liu Z, Li P, Jia C (2018d) Differentially private naive bayes learning over multiple data sources. Inf Sci 444:89–104MathSciNetCrossRef
Zurück zum Zitat Lin Q, Li J, Huang Z, Chen W, Shen J (2018a) A short linearly homomorphic proxy signature scheme. IEEE Access 6:12966–12972CrossRef Lin Q, Li J, Huang Z, Chen W, Shen J (2018a) A short linearly homomorphic proxy signature scheme. IEEE Access 6:12966–12972CrossRef
Zurück zum Zitat Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018b) An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRef Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018b) An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRef
Zurück zum Zitat Liu Z, Huang Y, Li J, Cheng X, Shen C (2018) Divoram: towards a practical oblivious ram with variable block size. Inf Sci 447:1–11CrossRef Liu Z, Huang Y, Li J, Cheng X, Shen C (2018) Divoram: towards a practical oblivious ram with variable block size. Inf Sci 447:1–11CrossRef
Zurück zum Zitat Naor M, Segev G (2009) Public-key cryptosystems resilient to key leakage. In: International cryptology conference on advances in cryptology, pp 18–35CrossRef Naor M, Segev G (2009) Public-key cryptosystems resilient to key leakage. In: International cryptology conference on advances in cryptology, pp 18–35CrossRef
Zurück zum Zitat Ruan O, Zhang Y, Zhang M, Zhou J, Harn L (2018) After-the-fact leakage-resilient identity-based authenticated key exchange. IEEE Syst J 12(2):2017–2026CrossRef Ruan O, Zhang Y, Zhang M, Zhou J, Harn L (2018) After-the-fact leakage-resilient identity-based authenticated key exchange. IEEE Syst J 12(2):2017–2026CrossRef
Zurück zum Zitat Shen J, Wang C, Li T, Chen X, Huang X, Zhan ZH (2018) Secure data uploading scheme for a smart home system. Inf Sci 453:186–197CrossRef Shen J, Wang C, Li T, Chen X, Huang X, Zhan ZH (2018) Secure data uploading scheme for a smart home system. Inf Sci 453:186–197CrossRef
Zurück zum Zitat Simmons P (2011) Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In: Proceedings of the 27th annual computer security applications conference, ACM, pp 73–82 Simmons P (2011) Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In: Proceedings of the 27th annual computer security applications conference, ACM, pp 73–82
Zurück zum Zitat Sun SF, Gu D, Liu S (2016) Efficient chosen ciphertext secure identity-based encryption against key leakage attacks. Secur Commun Netw 9(11):1417–1434CrossRef Sun SF, Gu D, Liu S (2016) Efficient chosen ciphertext secure identity-based encryption against key leakage attacks. Secur Commun Netw 9(11):1417–1434CrossRef
Zurück zum Zitat Taneja R, Gaur D (2018) Robust fuzzy neuro system for big data analytics. Dev Biol 85(2):344–357 Taneja R, Gaur D (2018) Robust fuzzy neuro system for big data analytics. Dev Biol 85(2):344–357
Zurück zum Zitat Wu J, Ping L, Ge X, Wang Y, Fu J (2010) Cloud storage as the infrastructure of cloud computing. In: 2010 international conference on intelligent computing and cognitive informatics (ICICCI), IEEE, pp 380–383 Wu J, Ping L, Ge X, Wang Y, Fu J (2010) Cloud storage as the infrastructure of cloud computing. In: 2010 international conference on intelligent computing and cognitive informatics (ICICCI), IEEE, pp 380–383
Zurück zum Zitat Xie R, He C, Xie D, Gao C, Zhang X (2018) A secure ciphertext retrieval scheme against insider kgas for mobile devices in cloud storage. Secur Commun Netw 2018(3):1–7CrossRef Xie R, He C, Xie D, Gao C, Zhang X (2018) A secure ciphertext retrieval scheme against insider kgas for mobile devices in cloud storage. Secur Commun Netw 2018(3):1–7CrossRef
Zurück zum Zitat Yu Z, Au MH, Xu Q, Yang R, Han J (2018) Towards leakage-resilient fine-grained access control in fog computing. Future Gener Comput Syst 78:763–777CrossRef Yu Z, Au MH, Xu Q, Yang R, Han J (2018) Towards leakage-resilient fine-grained access control in fog computing. Future Gener Comput Syst 78:763–777CrossRef
Zurück zum Zitat Zhang Y, Chen X, Li H, Cao J (2012) Identity-based construction for secure and efficient handoff authentication schemes in wireless networks. Secur Commun Netw 5(10):1121–1130CrossRef Zhang Y, Chen X, Li H, Cao J (2012) Identity-based construction for secure and efficient handoff authentication schemes in wireless networks. Secur Commun Netw 5(10):1121–1130CrossRef
Zurück zum Zitat Zhang Y, Li J, Chen X, Li H (2016a) Anonymous attribute-based proxy re-encryption for access control in cloud computing. Secur Commun Netw 9(14):2397–2411CrossRef Zhang Y, Li J, Chen X, Li H (2016a) Anonymous attribute-based proxy re-encryption for access control in cloud computing. Secur Commun Netw 9(14):2397–2411CrossRef
Zurück zum Zitat Zhang Y, Zheng D, Chen X, Li J, Li H (2016b) Efficient attribute-based data sharing in mobile clouds. Pervasive Mob Comput 28:135–149CrossRef Zhang Y, Zheng D, Chen X, Li J, Li H (2016b) Efficient attribute-based data sharing in mobile clouds. Pervasive Mob Comput 28:135–149CrossRef
Zurück zum Zitat Zhang Y, Zheng D, Li Q, Li J, Li H (2016c) Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Secur Commun Netw 9(16):3688–3702CrossRef Zhang Y, Zheng D, Li Q, Li J, Li H (2016c) Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Secur Commun Netw 9(16):3688–3702CrossRef
Zurück zum Zitat Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017a) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61CrossRef Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017a) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61CrossRef
Zurück zum Zitat Zhang Y, Li J, Zheng D, Chen X, Li H (2017b) Towards privacy protection and malicious behavior traceability in smart health. Personal Ubiquitous Comput 21(5):815–830CrossRef Zhang Y, Li J, Zheng D, Chen X, Li H (2017b) Towards privacy protection and malicious behavior traceability in smart health. Personal Ubiquitous Comput 21(5):815–830CrossRef
Zurück zum Zitat Zhang Y, Deng RH, Liu X, Zheng D (2018b) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277MathSciNetCrossRef Zhang Y, Deng RH, Liu X, Zheng D (2018b) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277MathSciNetCrossRef
Zurück zum Zitat Zhang Y, Deng RH, Shu J, Yang K, Zheng D (2018c) Tkse: trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6:31077–31087CrossRef Zhang Y, Deng RH, Shu J, Yang K, Zheng D (2018c) Tkse: trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6:31077–31087CrossRef
Zurück zum Zitat Zhang Y, Zheng D, Deng RH (2018d) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet of Things J 5(3):2130–2145CrossRef Zhang Y, Zheng D, Deng RH (2018d) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet of Things J 5(3):2130–2145CrossRef
Zurück zum Zitat Zhang Y, Zheng D, Rui G, Qinglan Z (2018e) Fine-grained access control systems suitable for resource-constrained users in cloud computing. Comput Inf 37(2):327–348 Zhang Y, Zheng D, Rui G, Qinglan Z (2018e) Fine-grained access control systems suitable for resource-constrained users in cloud computing. Comput Inf 37(2):327–348
Zurück zum Zitat Zheng D, Wu A, Zhang Y, Zhao Q (2018) Efficient and privacy-preserving medical data sharing in internet of things with limited computing power. IEEE Access 6:28019–28027CrossRef Zheng D, Wu A, Zhang Y, Zhao Q (2018) Efficient and privacy-preserving medical data sharing in internet of things with limited computing power. IEEE Access 6:28019–28027CrossRef
Zurück zum Zitat Zhou Y, Yang B (2017) Continuous leakage-resilient public-key encryption scheme with cca security. Comput J 60(8):1161–1172MathSciNetCrossRef Zhou Y, Yang B (2017) Continuous leakage-resilient public-key encryption scheme with cca security. Comput J 60(8):1161–1172MathSciNetCrossRef
Zurück zum Zitat Zhou Y, Yang B, Mu Y (2018) Continuous leakage-resilient identity-based encryption without random oracles. Comput J 61(4):586–600MathSciNetCrossRef Zhou Y, Yang B, Mu Y (2018) Continuous leakage-resilient identity-based encryption without random oracles. Comput J 61(4):586–600MathSciNetCrossRef
Metadaten
Titel
Efficient and secure big data storage system with leakage resilience in cloud computing
verfasst von
Yinghui Zhang
Menglei Yang
Dong Zheng
Pengzhen Lang
Axin Wu
Chen Chen
Publikationsdatum
01.08.2018
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 23/2018
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-018-3435-z

Weitere Artikel der Ausgabe 23/2018

Soft Computing 23/2018 Zur Ausgabe

Premium Partner