期刊文献+

Privacy-Preserving Protocol for Data Stored in the Cloud

Privacy-Preserving Protocol for Data Stored in the Cloud
下载PDF
导出
摘要 Data storage is an important application of cloud computing. With a cloud computing platform, the burden of local data storage can be reduced. However, services and applications in a cloud may come from different providers, and creating an efficient protocol to protect privacy is critical. We propose a verification protocol for cloud database entries that protects against untrusted service providers. Based on identity-based encryption (IBE) for cloud storage, this protocol guards against breaches of privacy in cloud storage. It prevents service providers from easily constructing cloud storage and forging the signature of data owners by secret sharing. Simulation results confirm the availability and efficiency of the proposed protocol. Data storage is an important application of cloud computing. With a cloud computing platform, the burden of local data storage can be reduced. However, services and applications in a cloud may come from different providers, and creating an efficient protocol to protect privacy is critical. We propose a verification protocol for cloud database entries that protects against untrusted service providers. Based on identity-based encryption (IBE) for cloud storage, this protocol guards against breaches of privacy in cloud storage. It prevents service providers from easily constructing cloud storage and forging the signature of data owners by secret sharing. Simulation results confirm the availability and efficiency of the proposed protocol.
出处 《ZTE Communications》 2011年第2期36-38,共3页 中兴通讯技术(英文版)
基金 supported by the National Natural Science Foundation of China under Grant No. 60873231 the National Basic Research Program of China ("973"Program) under Grant No. 2011CB302903 the High Education Natural Science Foundation of Jiangsu Province under Grant No. 08KJB520006 Funds of Key Lab of Fujian Province University Network Security and Cryptology under Grant No. 09A010 Innovation Project for postgraduate cultivation of Jiangsu Province, China under Grant No. CX10B_195Z
关键词 PRIVACY cloud storage IBE secret sharing privacy cloud storage IBE secret sharing
  • 相关文献

参考文献8

  • 1Q. Wang,C. Wang,K. Ren,W. Lou."Privacy-preserving public auditing for data storage security in cloud computing,". Proceedings IEEE INFOCOM . 2010
  • 2A. Shraer,C. Cachin,A. Cidon,I. Keidar,Y. Michalevsky,D. Shaket."Venus: Verification for untrusted cloud storage,". Proc. ACM Workshop on Cloud Comput. Security (CCSW’’10) .
  • 3Dan Boneh,Ben Lynn,Hovav Shacham.Short Signatures from the Weil Pairing[J]. Journal of Cryptology . 2004 (4)
  • 4W. Zeng,Y. Zhao,O. Kairi,W. Song."Research on cloud storage architecture and key technologies, ". Proc. 2nd Int. Conf. Interaction Sciences . 2009
  • 5E Bertino,F Paci,R Ferrini.Privacy-preserving digital identity management for cloud computing. IEEE Data Engineering Bulletin . 2009
  • 6Itani W,Kayssi A,Chehab A.Privacy as a service:Privacy-aware data storage and processing in cloud computing archi-tectures. Proceedings of the 8th IEEE International Sympo-sium on Dependable,Autonomic and SecureComputing(DASC) . 2009
  • 7Shamir A.How to share a secret. Communications of the ACM . 1979
  • 8Baek J,Zheng Y.Identity-based threshold decryption. Proc.PKC2004 . March1-42004

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部