A Secret and Traceable Approach for Cloud Data Sharing

IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Cloud Computing-Advances Systems and Applications Pub Date : 2023-07-01 DOI:10.1109/CSCloud-EdgeCom58631.2023.00038
Chenying Xu, Yanfei Yin, Yingwen Chen
{"title":"A Secret and Traceable Approach for Cloud Data Sharing","authors":"Chenying Xu, Yanfei Yin, Yingwen Chen","doi":"10.1109/CSCloud-EdgeCom58631.2023.00038","DOIUrl":null,"url":null,"abstract":"With the development of cloud computing, data owners generally use cloud services to reduce storage and computing overhead. However, data stored in cloud servers is out of the direct control of the data owners, causing serious security issues. Access control mechanism based on cryptography can effectively protect the security of cloud data and prevent unauthorized access to it. Nevertheless, users may redistribute data to other users after obtaining it, which can harm the copyright interests of the data owner. To address this issue, this paper proposes a secret and traceable approach for cloud data sharing. We combine the lattice-based proxy re-encryption with digital watermarking technology for redistribution tracking in cloud data sharing scenario. The lattice cipher used in this scheme is an encryption algorithm with homomorphic property based on the Ring-LWE problem. It has the advantage of reducing the ciphertext length and improving the efficiency of encryption. This paper demonstrates the feasibility and effectiveness of this scheme from a series of experiments. The encryption of an image of size 1024*1024 pixels takes only 9.78 seconds on average. The computational performance of this scheme is roughly 91.434% better than the existing data sharing schemes supporting redistribution tracking.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"19 1","pages":"173-180"},"PeriodicalIF":3.7000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Cloud Computing-Advances Systems and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00038","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

With the development of cloud computing, data owners generally use cloud services to reduce storage and computing overhead. However, data stored in cloud servers is out of the direct control of the data owners, causing serious security issues. Access control mechanism based on cryptography can effectively protect the security of cloud data and prevent unauthorized access to it. Nevertheless, users may redistribute data to other users after obtaining it, which can harm the copyright interests of the data owner. To address this issue, this paper proposes a secret and traceable approach for cloud data sharing. We combine the lattice-based proxy re-encryption with digital watermarking technology for redistribution tracking in cloud data sharing scenario. The lattice cipher used in this scheme is an encryption algorithm with homomorphic property based on the Ring-LWE problem. It has the advantage of reducing the ciphertext length and improving the efficiency of encryption. This paper demonstrates the feasibility and effectiveness of this scheme from a series of experiments. The encryption of an image of size 1024*1024 pixels takes only 9.78 seconds on average. The computational performance of this scheme is roughly 91.434% better than the existing data sharing schemes supporting redistribution tracking.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云数据共享的秘密和可追踪方法
随着云计算的发展,数据所有者普遍使用云服务来减少存储和计算开销。然而,存储在云服务器上的数据不受数据所有者的直接控制,导致了严重的安全问题。基于密码学的访问控制机制可以有效保护云数据的安全,防止未经授权的访问。然而,用户在获得数据后可能会将数据再分发给其他用户,这可能会损害数据所有者的版权利益。为了解决这个问题,本文提出了一种秘密的、可跟踪的云数据共享方法。将基于格的代理重加密与数字水印技术相结合,实现了云数据共享场景下的再分配跟踪。该方案中使用的格密码是一种基于Ring-LWE问题的具有同态性质的加密算法。它具有缩短密文长度,提高加密效率的优点。通过一系列实验验证了该方案的可行性和有效性。1024*1024像素的图像加密平均只需要9.78秒。与现有支持再分配跟踪的数据共享方案相比,该方案的计算性能提高约91.434%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Cloud Computing-Advances Systems and Applications
Journal of Cloud Computing-Advances Systems and Applications Computer Science-Computer Networks and Communications
CiteScore
6.80
自引率
7.50%
发文量
76
审稿时长
75 days
期刊介绍: The Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA) will publish research articles on all aspects of Cloud Computing. Principally, articles will address topics that are core to Cloud Computing, focusing on the Cloud applications, the Cloud systems, and the advances that will lead to the Clouds of the future. Comprehensive review and survey articles that offer up new insights, and lay the foundations for further exploratory and experimental work, are also relevant.
期刊最新文献
Research on electromagnetic vibration energy harvester for cloud-edge-end collaborative architecture in power grid FedEem: a fairness-based asynchronous federated learning mechanism Adaptive device sampling and deadline determination for cloud-based heterogeneous federated learning Review on the application of cloud computing in the sports industry Improving cloud storage and privacy security for digital twin based medical records
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1