Skip to main content

An Efficient and Recoverable Data Sharing Mechanism for Edge Storage

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11604))

Abstract

With data growing exponentially, more and more people prefer to share data with others by storing the data in edge servers. However, edge server cannot be deemed completely trustable as the sensitive data my be disclosed. Therefore, in this paper, we propose an efficient and secure data sharing scheme for edge storage by employing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) which can be utilized to conduct fine-grained control. This scheme can not only support data recovery when some edge servers break down by employing Secret Sharing Scheme, but also can support semi-trusted third party authority via employing re-encryption method. That is, the third party authority can not either reveal the private data stored in edge servers. Finally, we analyze security of our scheme to demonstrate that this scheme is resistant to eavesdropping attack and colluding attack. Additionally, relevant experiments results are shown that the scheme is feasibility and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jeong, J.-S., Kim, M., Yoo, K.-H., et al.: A content oriented smart education system based on cloud computing. Int. J. Multimed. Ubiquit. Eng. 8(6), 313–328 (2013)

    Google Scholar 

  2. Li, Y., Wu, C., Guo, L., Lee, C.-H., Guo, Y.: Wiki-health: a big data platform for health sensor data management. In: Cloud Computing Applications for Quality Health Care Delivery, pp. 59–77. IGI Global (2014)

    Google Scholar 

  3. Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., Chen, D.: OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In: 2013 Proceedings IEEE INFOCOM, pp. 2274–2282. IEEE (2013)

    Google Scholar 

  4. Mach, P., Becvar, Z.: Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19(3), 1628–1656 (2017)

    Google Scholar 

  5. Fu, J.-S., Liu, Y., Chao, H.-C., Bhargava, B.K., Zhang, Z.-J.: Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Ind. Inform. 14(10), 4519–4528 (2018)

    Google Scholar 

  6. Hu, C., Li, H., Huo, Y., Xiang, T., Liao, X.: Secure and efficient data communication protocol for wireless body area networks. IEEE Trans. Multi-scale Comput. Syst. 2(2), 94–107 (2016)

    Google Scholar 

  7. He, Z., Cai, Z., Han, Q., Tong, W., Sun, L., Li, Y.: An energy efficient privacy-preserving content sharing scheme in mobile social networks. Pers. Ubiquit. Comput. 20(5), 833–846 (2016)

    Google Scholar 

  8. Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1–9. IEEE (2017)

    Google Scholar 

  9. Alrawais, A., Alhothaily, A., Yu, J., Hu, C., Cheng, X.: SecureGuard: a certificate validation system in public key infrastructure. IEEE Trans. Veh. Technol. 67(6), 5399–5408 (2018)

    Google Scholar 

  10. Hu, C., Li, W., Cheng, X., Yu, J., Wang, S., Bie, R.: A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data 4(3), 341–355 (2018)

    Google Scholar 

  11. Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE IoT J. 4(6), 1868–1878 (2017)

    Google Scholar 

  12. Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)

    Google Scholar 

  13. Varghese, S., Vigila, S.M.C.: A varied approach to attribute based access model for secure storage in cloud. In: 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1–4. IEEE (2017)

    Google Scholar 

  14. Lyu, M., Li, X., Li, H.: Efficient, verifiable and privacy preserving decentralized attribute-based encryption for mobile cloud computing. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 195–204. IEEE (2017)

    Google Scholar 

  15. Yang, Y., Chen, X., Chen, H., Xuehui, D.: Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing. IEEE Access 6, 18009–18021 (2018)

    Google Scholar 

  16. Green, M., Hohenberger, S., Waters, B., et al.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium, vol. 2011 (2011)

    Google Scholar 

  17. Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343–1354 (2013)

    Google Scholar 

  18. Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)

    Google Scholar 

  19. Tian, W., Xu, H., Komi, M., Zhang, J.: Secure and flexible data sharing via ciphertext retrieval for cloud computing. In 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 161–166. IEEE (2017)

    Google Scholar 

  20. Wang, T., Zhou, J., Chen, X., Wang, G., Liu, A., Liu, Y.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3–12 (2018)

    Google Scholar 

  21. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007)

    Google Scholar 

  22. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Google Scholar 

Download references

Acknowledgments

This research was partially supported by the National Natural Science Foundation of China under grants 61702062, the National Natural Science Foundation of China with Grant No. U1836114 and the Chongqing Research Program of Basic Research and Frontier Technology with Grant (No. cstc2018jcyjAX0334,cstc2017jcyjB0305), the Fundamental Research Funds for the Central Universities (No. 2019CDQYRJ006), and Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing(cx2018015).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunqiang Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pu, Y., Wang, Y., Yang, F., Luo, J., Hu, C., Hu, H. (2019). An Efficient and Recoverable Data Sharing Mechanism for Edge Storage. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23597-0_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23596-3

  • Online ISBN: 978-3-030-23597-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics