Abstract
With data growing exponentially, more and more people prefer to share data with others by storing the data in edge servers. However, edge server cannot be deemed completely trustable as the sensitive data my be disclosed. Therefore, in this paper, we propose an efficient and secure data sharing scheme for edge storage by employing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) which can be utilized to conduct fine-grained control. This scheme can not only support data recovery when some edge servers break down by employing Secret Sharing Scheme, but also can support semi-trusted third party authority via employing re-encryption method. That is, the third party authority can not either reveal the private data stored in edge servers. Finally, we analyze security of our scheme to demonstrate that this scheme is resistant to eavesdropping attack and colluding attack. Additionally, relevant experiments results are shown that the scheme is feasibility and efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jeong, J.-S., Kim, M., Yoo, K.-H., et al.: A content oriented smart education system based on cloud computing. Int. J. Multimed. Ubiquit. Eng. 8(6), 313–328 (2013)
Li, Y., Wu, C., Guo, L., Lee, C.-H., Guo, Y.: Wiki-health: a big data platform for health sensor data management. In: Cloud Computing Applications for Quality Health Care Delivery, pp. 59–77. IGI Global (2014)
Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., Chen, D.: OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In: 2013 Proceedings IEEE INFOCOM, pp. 2274–2282. IEEE (2013)
Mach, P., Becvar, Z.: Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19(3), 1628–1656 (2017)
Fu, J.-S., Liu, Y., Chao, H.-C., Bhargava, B.K., Zhang, Z.-J.: Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Ind. Inform. 14(10), 4519–4528 (2018)
Hu, C., Li, H., Huo, Y., Xiang, T., Liao, X.: Secure and efficient data communication protocol for wireless body area networks. IEEE Trans. Multi-scale Comput. Syst. 2(2), 94–107 (2016)
He, Z., Cai, Z., Han, Q., Tong, W., Sun, L., Li, Y.: An energy efficient privacy-preserving content sharing scheme in mobile social networks. Pers. Ubiquit. Comput. 20(5), 833–846 (2016)
Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1–9. IEEE (2017)
Alrawais, A., Alhothaily, A., Yu, J., Hu, C., Cheng, X.: SecureGuard: a certificate validation system in public key infrastructure. IEEE Trans. Veh. Technol. 67(6), 5399–5408 (2018)
Hu, C., Li, W., Cheng, X., Yu, J., Wang, S., Bie, R.: A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data 4(3), 341–355 (2018)
Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE IoT J. 4(6), 1868–1878 (2017)
Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)
Varghese, S., Vigila, S.M.C.: A varied approach to attribute based access model for secure storage in cloud. In: 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1–4. IEEE (2017)
Lyu, M., Li, X., Li, H.: Efficient, verifiable and privacy preserving decentralized attribute-based encryption for mobile cloud computing. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 195–204. IEEE (2017)
Yang, Y., Chen, X., Chen, H., Xuehui, D.: Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing. IEEE Access 6, 18009–18021 (2018)
Green, M., Hohenberger, S., Waters, B., et al.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium, vol. 2011 (2011)
Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343–1354 (2013)
Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)
Tian, W., Xu, H., Komi, M., Zhang, J.: Secure and flexible data sharing via ciphertext retrieval for cloud computing. In 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 161–166. IEEE (2017)
Wang, T., Zhou, J., Chen, X., Wang, G., Liu, A., Liu, Y.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3–12 (2018)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Acknowledgments
This research was partially supported by the National Natural Science Foundation of China under grants 61702062, the National Natural Science Foundation of China with Grant No. U1836114 and the Chongqing Research Program of Basic Research and Frontier Technology with Grant (No. cstc2018jcyjAX0334,cstc2017jcyjB0305), the Fundamental Research Funds for the Central Universities (No. 2019CDQYRJ006), and Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing(cx2018015).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Pu, Y., Wang, Y., Yang, F., Luo, J., Hu, C., Hu, H. (2019). An Efficient and Recoverable Data Sharing Mechanism for Edge Storage. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-23597-0_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23596-3
Online ISBN: 978-3-030-23597-0
eBook Packages: Computer ScienceComputer Science (R0)