Abstract
With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity of their data. It is crucial to provide data sharing services that satisfy these security requirements. We introduce a reliable and secure data sharing scheme, using the threshold secret sharing technique and the Chaum-Pedersen zero-knowledge proof. The proposed scheme is not only effective and flexible, but also able to achieve the semantic security property. Moreover, our scheme is capable of ensuring accountability of users’ decryption keys as well as cheater identification if some users behave dishonestly. The efficiency analysis shows that the proposed scheme has a better performance in terms of computational cost, compared with the related work. It is particularly suitable for application to protect users’ medical insurance data over the cloud.
Similar content being viewed by others
References
Alhat RY, Kedari DB, Sangale BG, et al., 2014. Ensuring distributed accountability for data sharing in the cloud network. Int J Eng Res Technol, 3(2):494–501.
Bloom BH, 1970. Space/time trade-offs in hash coding with allowable errors. Commun ACM, 13(7):422–426. https://doi.org/10.1145/362686.362692
Chaum D, Pedersen TP, 1992. Wallet databases with observers. 12th Annual Int Cryptology Conf on Advances in Cryptology, p.89–105. https://doi.org/10.1007/3-540-48071-4_7
Dong X, Yu JD, Luo Y, et al., 2014. Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Comput Secur, 42:151–164. https://doi.org/10.1016/j.cose.2013.12.002
Feng J, Yang LT, Dai GH, et al., 2018. A secure higherorder Lanczos-based orthogonal tensor SVD for big data reduction. IEEE Trans Big Data, in press. https://doi.org/10.1109/tbdata.2018.2803841
Fouque PA, Poupard G, Stern J, 2000. Sharing decryption in the context of voting or lotteries. Int Conf on Financial Cryptography, p.90–104. https://doi.org/10.1007/3-540-45472-1_7
Hoshino H, Obana S, 2016. Cheating detectable secret sharing scheme suitable for implementation. 4th Int Symp on Computing and Networking, p.623–628. https://doi.org/10.1109/CANDAR.2016.0112
Kale P, Vaidya M, 2016. Key-aggregate cryptosystem for scalable data sharing in cloud storage. Imper J Int Res, 2(8):957–961.
Lai JZ, Deng RH, Li YJ, 2012. Expressive CP-ABE with partially hidden access structures. 7th ACM Symp on Information, Computer and Communications Security, p.18–19. https://doi.org/10.1145/2414456.2414465
Li HR, Xiong L, Zhang LF, et al., 2014. DPSynthesizer: differentially private data synthesizer for privacy preserving data sharing. Proc VLDB Endowm, 7(13):1677–1680. https://doi.org/10.14778/2733004.2733059
Liang KT, Au MH, Liu JK, et al., 2014. A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans Inform Forens Secur, 9(10):1667–1680. https://doi.org/10.1109/tifs.2014.2346023
Liu Q, Wang GJ, Wu J, 2014. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inform Sci, 258:355–370. https://doi.org/10.1016/j.ins.2012.09.034
Liu XF, Zhang YQ, Wang BY, et al., 2013. Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans Parall Distrib Syst, 24(6):1182–1191. https://doi.org/10.1109/tpds.2012.331
Mohammed N, Alhadidi D, Fung BCM, et al., 2014. Secure two-party differentially private data release for vertically partitioned data. IEEE Trans Depend Secur Comput, 11(1):59–71. https://doi.org/10.1109/tdsc.2013.22
Obana S, Tsuchida K, 2014. Cheating detectable secret sharing schemes supporting an arbitrary finite field. In: Yoshida M, Mouri K (Eds.), Advances in Information and Computer Security. Springer, Cham, p.88-97. https://doi.org/10.1007/978-3-319-09843-2_7
Shamir A, 1979. How to share a secret. Commun ACM, 22(11):612–613. https://doi.org/10.1145/359168.359176
Shen J, Zhou TQ, He DB, et al., 2017. Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Depend Secur Comput, in press. https://doi.org/10.1109/tdsc.2017.2725953
Xu SM, Yang GM, Mu Y, et al., 2018. Secure fine-grained access control and data sharing for dynamic groups in the cloud. IEEE Trans Inform Forens Secur, 3(8):2101–2113. https://doi.org/10.1109/tifs.2018.2810065
Yang JJ, Li JQ, Niu Y, 2015. A hybrid solution for privacy preserving medical data sharing in the cloud environment. Fut Gener Comput Syst, 43–44:74–86. https://doi.org/10.1016/j.future.2014.06.004
Yang LT, Huang GY, Feng J, et al., 2017. Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing. Inform Sci, 387:254–265. https://doi.org/10.1016/j.ins.2016.10.017
Yu SC, Wang C, Ren K, et al., 2010. Achieving secure, scalable, and fine-grained data access control in cloud computing. IEEE Int Conf on Computer Communications, p.1–9. https://doi.org/10.1109/INFCOM.2010.5462174
Author information
Authors and Affiliations
Corresponding author
Additional information
Project supported by the National Key R&D Program of China (No. 2017YFB0802000), the National Natural Science Foundation of China (Nos. 61772326 and 61572303), the Research Fund for International Young Scientists, China (No. 61750110528), National Cryptography Development Fund for the 13th Five-Year Plan, China (No. MMJJ20170216), the Foundation of State Key Laboratory of Information Security, China (No. 2017-MS-03), the Fundamental Research Funds for the Central Universities, China (No. GK201702004), the Scientific Research Program Funded by Shaanxi Provincial Education Department, China (No. 16JK1109), the Provincial Natural Science Foundation Research Project of Shaanxi, China (No. 2017JQ6029), and the Doctoral Scientific Fund Project of Shaanxi University of Science & Technology, China (No. BJ11-12)
Rights and permissions
About this article
Cite this article
Wang, X., Yang, B., Xia, Z. et al. A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage. Frontiers Inf Technol Electronic Eng 20, 787–800 (2019). https://doi.org/10.1631/FITEE.1800066
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1631/FITEE.1800066