Skip to main content

2013 | OriginalPaper | Buchkapitel

Secure Method for Data Storage and Sharing During Data Outsourcing

verfasst von : Sun-Ho Lee, Sung Jong Go, Im-Yeong Lee

Erschienen in: Information Technology Convergence

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data via networks and various devices, which are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy re-encryption. However, existing searchable encryption technology is inconvenient for use in the storage outsourcing environments where users upload their data, which are shared with others as necessary. The users also change frequently. In addition, some existing methods are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we propose a secure and efficient method for data storage and sharing during data outsourcing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Song DX, Wagner D, Perrig A (2000) Practical techniques for searching on encrypted data. In: Symposium on security and privacy. California, USA Song DX, Wagner D, Perrig A (2000) Practical techniques for searching on encrypted data. In: Symposium on security and privacy. California, USA
2.
Zurück zum Zitat Goh EJ (2004) Secure indexes. Crpytography ePrint Archive Goh EJ (2004) Secure indexes. Crpytography ePrint Archive
3.
Zurück zum Zitat Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. Virginia, USA Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. Virginia, USA
4.
Zurück zum Zitat Boneh D, Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Proceedings of international conference on the theory and applications of cryptographic techniques. Interlaken, Switzerland Boneh D, Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Proceedings of international conference on the theory and applications of cryptographic techniques. Interlaken, Switzerland
5.
Zurück zum Zitat Boneh D, Waters B (2007) Conjunctive, subset and range queries on encrypted data. In: Proceedings of the 4th theory of cryptography conference. Amsterdam, The Netherlands Boneh D, Waters B (2007) Conjunctive, subset and range queries on encrypted data. In: Proceedings of the 4th theory of cryptography conference. Amsterdam, The Netherlands
6.
Zurück zum Zitat Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Proceedings of the 1st international conference on pairing-based cryptography. Tokyo, Japan Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Proceedings of the 1st international conference on pairing-based cryptography. Tokyo, Japan
7.
Zurück zum Zitat Bao F, Deng RH, Ding X, Yang Y (2008) Private query on encrypted data in multi-user settings. In: Proceedings of the 4th international conference on information security practice and experience. Sydney, Australia Bao F, Deng RH, Ding X, Yang Y (2008) Private query on encrypted data in multi-user settings. In: Proceedings of the 4th international conference on information security practice and experience. Sydney, Australia
8.
Zurück zum Zitat Kamara S, Lauter K (2010) Cryptographic outsourcing storage. In: Proceedings of Workshops on financial cryptography and data security. Canary Islands, Spain, pp 25–28 Kamara S, Lauter K (2010) Cryptographic outsourcing storage. In: Proceedings of Workshops on financial cryptography and data security. Canary Islands, Spain, pp 25–28
9.
Zurück zum Zitat Ion M, Russello G, Crispo B (2011) Enforcing multi-user access policies to encrypted cloud databases. In: International symposium on policies for distributed systems and networks. Trento, Italy Ion M, Russello G, Crispo B (2011) Enforcing multi-user access policies to encrypted cloud databases. In: International symposium on policies for distributed systems and networks. Trento, Italy
10.
Zurück zum Zitat Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34:1CrossRef Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34:1CrossRef
11.
Zurück zum Zitat Yang Y (2011) Towards multi-user private keyword search for cloud computing. In: Proceeding of international conference on cloud computing. Singapore, Singapore Yang Y (2011) Towards multi-user private keyword search for cloud computing. In: Proceeding of international conference on cloud computing. Singapore, Singapore
12.
Zurück zum Zitat Chen X, Li Y (2011) Efficient proxy re-encryption with private keyword searching in untrusted storage. Int J Comput Netw Inf Secur 3:2 Chen X, Li Y (2011) Efficient proxy re-encryption with private keyword searching in untrusted storage. Int J Comput Netw Inf Secur 3:2
13.
Zurück zum Zitat Wang XA, Huang X, Yang X, Liu L, Wu X (2011) Further observation on proxy re-encryption with keyword. J Syst Softw 85:643–654CrossRef Wang XA, Huang X, Yang X, Liu L, Wu X (2011) Further observation on proxy re-encryption with keyword. J Syst Softw 85:643–654CrossRef
Metadaten
Titel
Secure Method for Data Storage and Sharing During Data Outsourcing
verfasst von
Sun-Ho Lee
Sung Jong Go
Im-Yeong Lee
Copyright-Jahr
2013
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-6996-0_51

Neuer Inhalt