Skip to main content

2021 | OriginalPaper | Buchkapitel

Secure Group Data Sharing with an Efficient Key Management without Re-Encryption Scheme in Cloud Computing

verfasst von : Lalit Mohan Gupta, Hitendra Garg, Abdus Samad

Erschienen in: Proceedings of Second International Conference on Computing, Communications, and Cyber-Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing becomes an essential tool for internet users which provide various computing resources over the cloud. Providing on-demand storage is being one of the major services which is effective to meet out the expectations of an organization when utilizes the computational resources while accessing large amount of data. Storing the data on cloud is being a big challenge for the researchers in terms of maintaining the protection and security of data. Sharing of the data among a group can lead to insecurity of data from external and internal threats. This paper introduces a protected data sharing framework in the cloud storage that maintains the privacy and confidentiality of data. The proposed method uses the MD5 hash function that is relatively faster than the SHA256 hash function for checking the data integrity. The framework also provides a check on accessing and sharing of data. Exhaustive re-encryption computations are avoided and a single encryption key is used to encrypt the entire file. There are two distinct key shares for each of the users and user is allowed to share one at a time get access data. In this way having access to a single portion of a key permit the framework to safeguard the data against internal threats. Cryptographic server is used to store the other key share and performs all the expensive computations which are considered as a trusted third party. Proposed work also measure the efficiency of the model based on the time taken to execute the various operations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abbas A, Khan SU (2014) A review on the state-of-the-art privacy preserving approaches in e-health clouds. IEEE J Biomed Health Inf 18(1):1431–1441MathSciNetCrossRef Abbas A, Khan SU (2014) A review on the state-of-the-art privacy preserving approaches in e-health clouds. IEEE J Biomed Health Inf 18(1):1431–1441MathSciNetCrossRef
3.
Zurück zum Zitat Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gen Comput Syst 29(5):1278–1299CrossRef Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gen Comput Syst 29(5):1278–1299CrossRef
4.
Zurück zum Zitat Wei L, Zhu H, Cao Z, Chen Y, Vasilakos AV (2014) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386CrossRef Wei L, Zhu H, Cao Z, Chen Y, Vasilakos AV (2014) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386CrossRef
5.
Zurück zum Zitat Cloud Security Alliance (2011) Security guidelines for critical areas of focus in cloud computing v3.0 Cloud Security Alliance (2011) Security guidelines for critical areas of focus in cloud computing v3.0
6.
Zurück zum Zitat Gehani A, LaBean T Reif J (2000) DNA-based cryptography. DIMACS DNA based computers V. American Mathematical Society Gehani A, LaBean T Reif J (2000) DNA-based cryptography. DIMACS DNA based computers V. American Mathematical Society
7.
Zurück zum Zitat Gehani A et al (2004) DNA-based cryptography. Lect Notes Comput Sci 2950:167–188CrossRef Gehani A et al (2004) DNA-based cryptography. Lect Notes Comput Sci 2950:167–188CrossRef
8.
11.
Zurück zum Zitat Khan AN, Kiah MM, Madani SA, Ali M, Shamshir-band S (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Super comput 68(2):624–651 Khan AN, Kiah MM, Madani SA, Ali M, Shamshir-band S (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Super comput 68(2):624–651
12.
Zurück zum Zitat Chen Y, Tzeng W (2012) Efficient and provably-secure group key management scheme using key derivation. In: Proceedings of IEEE 11th international conference on trust, security, and privacy in computing and communications, pp 295–302 Chen Y, Tzeng W (2012) Efficient and provably-secure group key management scheme using key derivation. In: Proceedings of IEEE 11th international conference on trust, security, and privacy in computing and communications, pp 295–302
13.
Zurück zum Zitat Gutmann P (1996) Secure deletion of data from magnetic and solid-state memory. In: Proceedings of 6th USENIX Security Symposium. Focusing Application Cryptography, p 8 Gutmann P (1996) Secure deletion of data from magnetic and solid-state memory. In: Proceedings of 6th USENIX Security Symposium. Focusing Application Cryptography, p 8
15.
Zurück zum Zitat Liu DL, Chen YP, Zhang HP (2010) Secure applications of RSA system in the electronic commerce. In: International conference on future information technology and management engineering, vol 1, pp 86–89 Liu DL, Chen YP, Zhang HP (2010) Secure applications of RSA system in the electronic commerce. In: International conference on future information technology and management engineering, vol 1, pp 86–89
16.
Zurück zum Zitat Gola KK, Gupta B, Iqbal Z (2014) Modified RSA digital signature scheme for data confidentiality. Int J Comput Appl 106(13) Gola KK, Gupta B, Iqbal Z (2014) Modified RSA digital signature scheme for data confidentiality. Int J Comput Appl 106(13)
17.
Zurück zum Zitat Arora R, Parashar A (2013) Secure user data in cloud computing using encryption algorithms. Int J Eng Res Appl 3(4):1922–1926 Arora R, Parashar A (2013) Secure user data in cloud computing using encryption algorithms. Int J Eng Res Appl 3(4):1922–1926
18.
Zurück zum Zitat Xu L, Wu X, Zhang X (2012) CL-PRE: A certificateless proxy re- encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM symposium on information, computer and communication security, pp 87–88 Xu L, Wu X, Zhang X (2012) CL-PRE: A certificateless proxy re- encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM symposium on information, computer and communication security, pp 87–88
19.
Zurück zum Zitat Seo S, Nabeel M, Ding X, Bertino E (2013) An efficient certificate- less encryption for secure data sharing in public clouds. IEEE Trans Knowl Data Eng 26(9):2107–2119CrossRef Seo S, Nabeel M, Ding X, Bertino E (2013) An efficient certificate- less encryption for secure data sharing in public clouds. IEEE Trans Knowl Data Eng 26(9):2107–2119CrossRef
20.
Zurück zum Zitat Rewadkar DN, Ghatage SY (2014) Cloud storage system enabling secure privacy preserving third party audit. In: International conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE, New York Rewadkar DN, Ghatage SY (2014) Cloud storage system enabling secure privacy preserving third party audit. In: International conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE, New York
21.
Zurück zum Zitat Gupta LM, Samad A, Garg H (2020) TBHM: a secure threshold-based encryption combined with homomorphic properties for communicating health records. Int J Inf Technol Web Eng (IJITWE) 15(3):1–17CrossRef Gupta LM, Samad A, Garg H (2020) TBHM: a secure threshold-based encryption combined with homomorphic properties for communicating health records. Int J Inf Technol Web Eng (IJITWE) 15(3):1–17CrossRef
24.
Zurück zum Zitat Fan Y, Lin X, Tan G, Zhang Y, Dong W, Lei J (2019) One secure data integrity verification scheme for cloud storage. Future Gener Comput Syst 96:376–385CrossRef Fan Y, Lin X, Tan G, Zhang Y, Dong W, Lei J (2019) One secure data integrity verification scheme for cloud storage. Future Gener Comput Syst 96:376–385CrossRef
25.
Zurück zum Zitat Rachmawati D, Tarigan JT, Ginting ABC (2018) A comparative study of message digest 5 (MD5) and SHA256 algorithm. J Phys: Conf Ser 978(1):012116 (IOP Publishing) Rachmawati D, Tarigan JT, Ginting ABC (2018) A comparative study of message digest 5 (MD5) and SHA256 algorithm. J Phys: Conf Ser 978(1):012116 (IOP Publishing)
Metadaten
Titel
Secure Group Data Sharing with an Efficient Key Management without Re-Encryption Scheme in Cloud Computing
verfasst von
Lalit Mohan Gupta
Hitendra Garg
Abdus Samad
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0733-2_19

Neuer Inhalt