{"title":"云数据共享的秘密和可追踪方法","authors":"Chenying Xu, Yanfei Yin, Yingwen Chen","doi":"10.1109/CSCloud-EdgeCom58631.2023.00038","DOIUrl":null,"url":null,"abstract":"With the development of cloud computing, data owners generally use cloud services to reduce storage and computing overhead. However, data stored in cloud servers is out of the direct control of the data owners, causing serious security issues. Access control mechanism based on cryptography can effectively protect the security of cloud data and prevent unauthorized access to it. Nevertheless, users may redistribute data to other users after obtaining it, which can harm the copyright interests of the data owner. To address this issue, this paper proposes a secret and traceable approach for cloud data sharing. We combine the lattice-based proxy re-encryption with digital watermarking technology for redistribution tracking in cloud data sharing scenario. The lattice cipher used in this scheme is an encryption algorithm with homomorphic property based on the Ring-LWE problem. It has the advantage of reducing the ciphertext length and improving the efficiency of encryption. This paper demonstrates the feasibility and effectiveness of this scheme from a series of experiments. The encryption of an image of size 1024*1024 pixels takes only 9.78 seconds on average. The computational performance of this scheme is roughly 91.434% better than the existing data sharing schemes supporting redistribution tracking.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"19 1","pages":"173-180"},"PeriodicalIF":3.7000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Secret and Traceable Approach for Cloud Data Sharing\",\"authors\":\"Chenying Xu, Yanfei Yin, Yingwen Chen\",\"doi\":\"10.1109/CSCloud-EdgeCom58631.2023.00038\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of cloud computing, data owners generally use cloud services to reduce storage and computing overhead. However, data stored in cloud servers is out of the direct control of the data owners, causing serious security issues. Access control mechanism based on cryptography can effectively protect the security of cloud data and prevent unauthorized access to it. Nevertheless, users may redistribute data to other users after obtaining it, which can harm the copyright interests of the data owner. To address this issue, this paper proposes a secret and traceable approach for cloud data sharing. We combine the lattice-based proxy re-encryption with digital watermarking technology for redistribution tracking in cloud data sharing scenario. The lattice cipher used in this scheme is an encryption algorithm with homomorphic property based on the Ring-LWE problem. It has the advantage of reducing the ciphertext length and improving the efficiency of encryption. This paper demonstrates the feasibility and effectiveness of this scheme from a series of experiments. The encryption of an image of size 1024*1024 pixels takes only 9.78 seconds on average. The computational performance of this scheme is roughly 91.434% better than the existing data sharing schemes supporting redistribution tracking.\",\"PeriodicalId\":56007,\"journal\":{\"name\":\"Journal of Cloud Computing-Advances Systems and Applications\",\"volume\":\"19 1\",\"pages\":\"173-180\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2023-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Cloud Computing-Advances Systems and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00038\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Cloud Computing-Advances Systems and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00038","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A Secret and Traceable Approach for Cloud Data Sharing
With the development of cloud computing, data owners generally use cloud services to reduce storage and computing overhead. However, data stored in cloud servers is out of the direct control of the data owners, causing serious security issues. Access control mechanism based on cryptography can effectively protect the security of cloud data and prevent unauthorized access to it. Nevertheless, users may redistribute data to other users after obtaining it, which can harm the copyright interests of the data owner. To address this issue, this paper proposes a secret and traceable approach for cloud data sharing. We combine the lattice-based proxy re-encryption with digital watermarking technology for redistribution tracking in cloud data sharing scenario. The lattice cipher used in this scheme is an encryption algorithm with homomorphic property based on the Ring-LWE problem. It has the advantage of reducing the ciphertext length and improving the efficiency of encryption. This paper demonstrates the feasibility and effectiveness of this scheme from a series of experiments. The encryption of an image of size 1024*1024 pixels takes only 9.78 seconds on average. The computational performance of this scheme is roughly 91.434% better than the existing data sharing schemes supporting redistribution tracking.
期刊介绍:
The Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA) will publish research articles on all aspects of Cloud Computing. Principally, articles will address topics that are core to Cloud Computing, focusing on the Cloud applications, the Cloud systems, and the advances that will lead to the Clouds of the future. Comprehensive review and survey articles that offer up new insights, and lay the foundations for further exploratory and experimental work, are also relevant.