Abstract
Cloud computing is emerging as an increasingly popular computing paradigm. Sharing of data in the cloud environments raises the issues of confidentiality, integrity, and availability. In this paper, we propose a framework and methodology for sharing data over untrusted cloud, using proxy re-encryption based on elliptic curve discrete logarithm problem. The proposed methodology imperatively imposes the access control policies of data originator, preventing the cloud storage providers from unauthorized access and illegal authorization to access the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53, 50–58 (2010)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)
Zhao, G., Rong, C., Li, J., Zhang, F., Tang, Y.: Trusted data sharing over untrusted cloud storage providers. In: CloudCom-10, pp. 97–103 (2010)
Wang, W., Li, Z., Owens, R., Bhargava, B, K.: Secure and efficient access to outsourced data. In: CCSW, pp. 55–66 (2009)
Kumbhare, A.G., Simmhan, Y., Prasanna, V.: Designing a secure storage repository for sharing scientific datasets using public clouds. In:International workshop on Data intensive computing in the clouds (DataCloud-SC), pp. 31–40 (2011)
Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010)
Yang, Y., Zhang, Y.: A generic scheme for secure data sharing in cloud. In: International Conference on Parallel Processing Workshops (ICPPW), pp. 145–153 (2011)
Thilakanathan, D., Chen, S., Nepal, S., Calvo, R.A.: Secure data sharing in the cloud. In: Nepal, S., Pathan, M. (eds.) Security, Privacy and Trust in Cloud system, pp. 45–72. Springer, Heidelberg (2014)
Juels, A., Kaliski, B, S.: Pors: Proofs of retrievability for large files. In: CCS, pp. 584–597 (2007)
Xin, D., Jiadi, Y., Yuan, L., et al.: Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Computers and Security 42, 151–164 (2014)
Bharath, K.S., Yousef, E., Gerry, H., Sanjay, K.M.: A secure data sharing and query processing framework via federation of cloud computing. Inf. Syst. J. 48, 196–212 (2015)
Deyan, C., Hong, Z.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), pp. 647–651 (2012)
Minqi, Z., Rong, Z., Wei Xie., et al.: Security and privacy in cloud computing: a survey. In: Semantics Knowledge and Grid (SKG), pp. 105–112 (2010)
Guiyi, W., Rongxing, L., Jun, S.: EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. J. Comput. Syst. Sci. 80(8), 1549–1562 (2014)
Zhifeng, X., Yang, X.: Security and privacy in cloud computing. Commun. Surv. Tutorials 15(2), 843–859 (2013)
Nyre, Å.A., Jaatun, M.G.: Privacy in a semantic cloud: what’s trust got to do with it? In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 107–118. Springer, Heidelberg (2009)
Younis, A.Y., Kashif, K., Madjid, M.: An access control model for cloud computing. J. Inf. Secur. Appl. 19(1), 4560 (2014)
Raluca, A.P., Jacob, R.L., et al.: Enabling security in cloud storage SLAs with CloudProof. In: USENIX Annual Technical Conference (2011)
Tysowski, P.K., Hasan, M.A.: Re-encryption-based key management towards secure and scalable mobile applications in clouds. IACR Cryptology ePrint Archive (2011)
Tysowski, P.K., Hasan, M.A.: Hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE T. Cloud Comput. 1(2), 172–186 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Tiwari, D., Gangadharan, G.R. (2015). Secure Sharing of Data in Cloud Computing. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-MartÃnez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-22915-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22914-0
Online ISBN: 978-3-319-22915-7
eBook Packages: Computer ScienceComputer Science (R0)