Skip to main content

Secure Sharing of Data in Cloud Computing

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

  • 1751 Accesses

Abstract

Cloud computing is emerging as an increasingly popular computing paradigm. Sharing of data in the cloud environments raises the issues of confidentiality, integrity, and availability. In this paper, we propose a framework and methodology for sharing data over untrusted cloud, using proxy re-encryption based on elliptic curve discrete logarithm problem. The proposed methodology imperatively imposes the access control policies of data originator, preventing the cloud storage providers from unauthorized access and illegal authorization to access the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53, 50–58 (2010)

    Article  Google Scholar 

  2. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)

    Article  Google Scholar 

  3. Zhao, G., Rong, C., Li, J., Zhang, F., Tang, Y.: Trusted data sharing over untrusted cloud storage providers. In: CloudCom-10, pp. 97–103 (2010)

    Google Scholar 

  4. Wang, W., Li, Z., Owens, R., Bhargava, B, K.: Secure and efficient access to outsourced data. In: CCSW, pp. 55–66 (2009)

    Google Scholar 

  5. Kumbhare, A.G., Simmhan, Y., Prasanna, V.: Designing a secure storage repository for sharing scientific datasets using public clouds. In:International workshop on Data intensive computing in the clouds (DataCloud-SC), pp. 31–40 (2011)

    Google Scholar 

  6. Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Yang, Y., Zhang, Y.: A generic scheme for secure data sharing in cloud. In: International Conference on Parallel Processing Workshops (ICPPW), pp. 145–153 (2011)

    Google Scholar 

  8. Thilakanathan, D., Chen, S., Nepal, S., Calvo, R.A.: Secure data sharing in the cloud. In: Nepal, S., Pathan, M. (eds.) Security, Privacy and Trust in Cloud system, pp. 45–72. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  9. Juels, A., Kaliski, B, S.: Pors: Proofs of retrievability for large files. In: CCS, pp. 584–597 (2007)

    Google Scholar 

  10. Xin, D., Jiadi, Y., Yuan, L., et al.: Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Computers and Security 42, 151–164 (2014)

    Article  Google Scholar 

  11. Bharath, K.S., Yousef, E., Gerry, H., Sanjay, K.M.: A secure data sharing and query processing framework via federation of cloud computing. Inf. Syst. J. 48, 196–212 (2015)

    Article  Google Scholar 

  12. Deyan, C., Hong, Z.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), pp. 647–651 (2012)

    Google Scholar 

  13. Minqi, Z., Rong, Z., Wei Xie., et al.: Security and privacy in cloud computing: a survey. In: Semantics Knowledge and Grid (SKG), pp. 105–112 (2010)

    Google Scholar 

  14. Guiyi, W., Rongxing, L., Jun, S.: EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. J. Comput. Syst. Sci. 80(8), 1549–1562 (2014)

    Article  MATH  Google Scholar 

  15. Zhifeng, X., Yang, X.: Security and privacy in cloud computing. Commun. Surv. Tutorials 15(2), 843–859 (2013)

    Article  Google Scholar 

  16. Nyre, Å.A., Jaatun, M.G.: Privacy in a semantic cloud: what’s trust got to do with it? In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 107–118. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  17. Younis, A.Y., Kashif, K., Madjid, M.: An access control model for cloud computing. J. Inf. Secur. Appl. 19(1), 4560 (2014)

    Google Scholar 

  18. Raluca, A.P., Jacob, R.L., et al.: Enabling security in cloud storage SLAs with CloudProof. In: USENIX Annual Technical Conference (2011)

    Google Scholar 

  19. Tysowski, P.K., Hasan, M.A.: Re-encryption-based key management towards secure and scalable mobile applications in clouds. IACR Cryptology ePrint Archive (2011)

    Google Scholar 

  20. Tysowski, P.K., Hasan, M.A.: Hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE T. Cloud Comput. 1(2), 172–186 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepnarayan Tiwari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Tiwari, D., Gangadharan, G.R. (2015). Secure Sharing of Data in Cloud Computing. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics