Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can access...Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation(RMI).The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user.Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service.To improve the performance in data security,the block chains are used for securing the data in the cloud environment.However,the traditional block chain technique are not suitable to provide efficient security to the cloud data stored in the cloud.In this paper,an efficient user centric block level Attribute Based Encryption(UCBL-ABE)scheme is presented to provide the efficient security of cloud data in cloud environment.The proposed approach performs data transaction by employing the block chain.The proposed system provides efficient privacy with access control to the user access according to the behavior of cloud user using Data Level Access Trust(DLAT).Based on DLAT,the user access has been restricted in the cloud environment.The proposed protocol is implemented in real time using Java programming language and uses IBM cloud.The implementation results justifies that the proposed system can able to provide efficient security to the data present in and cloud and also enhances the cloud performance.展开更多
Updatable block-level message-locked encryption(MLE) can efficiently update encrypted data, and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor(TPA). However, there ar...Updatable block-level message-locked encryption(MLE) can efficiently update encrypted data, and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor(TPA). However, there are seldom schemes supporting both updatable block-level deduplication and public auditing. In this paper, an updatable block-level deduplication scheme with efficient auditing is proposed based on a tree-based authenticated structure. In the proposed scheme, the cloud server(CS) can perform block-level deduplication, and the TPA achieves integrity auditing tasks. When a data block is updated, the ciphertext and auditing tags could be updated efficiently. The security analysis demonstrates that the proposed scheme can achieve privacy under chosen distribution attacks in secure deduplication and resist uncheatable chosen distribution attacks(UNC-CDA) in proof of ownership(PoW). Furthermore, the integrity auditing process is proven secure under adaptive chosen-message attacks. Compared with previous relevant schemes, the proposed scheme achieves better functionality and higher efficiency.展开更多
Ciphertext-policy attribute-based searchable encryption (CP-ABSE) can achieve fine-grained access control for data sharing and retrieval, and secure deduplication can save storage space by eliminating duplicate copi...Ciphertext-policy attribute-based searchable encryption (CP-ABSE) can achieve fine-grained access control for data sharing and retrieval, and secure deduplication can save storage space by eliminating duplicate copies. However, there are seldom schemes supporting both searchable encryption and secure deduplication. In this paper, a large universe CP-ABSE scheme supporting secure block-level deduplication are proposed under a hybrid cloud mechanism. In the proposed scheme, after the ciphertext is inserted into bloom filter tree (BFT), private cloud can perform fine-grained deduplication efficiently by matching tags, and public cloud can search efficiently using homomorphic searchable method and keywords matching. Finally, the proposed scheme can achieve privacy under chosen distribution attacks block-level (PRV-CDA-B) secure deduplication and match-concealing (MC) searchable security. Compared with existing schemes, the proposed scheme has the advantage in supporting fine-grained access control, block-level deduplication and efficient search, simultaneously.展开更多
文摘Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation(RMI).The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user.Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service.To improve the performance in data security,the block chains are used for securing the data in the cloud environment.However,the traditional block chain technique are not suitable to provide efficient security to the cloud data stored in the cloud.In this paper,an efficient user centric block level Attribute Based Encryption(UCBL-ABE)scheme is presented to provide the efficient security of cloud data in cloud environment.The proposed approach performs data transaction by employing the block chain.The proposed system provides efficient privacy with access control to the user access according to the behavior of cloud user using Data Level Access Trust(DLAT).Based on DLAT,the user access has been restricted in the cloud environment.The proposed protocol is implemented in real time using Java programming language and uses IBM cloud.The implementation results justifies that the proposed system can able to provide efficient security to the data present in and cloud and also enhances the cloud performance.
基金supported by the Doctoral Foundation in Henan University of Technology (31401152)
文摘Updatable block-level message-locked encryption(MLE) can efficiently update encrypted data, and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor(TPA). However, there are seldom schemes supporting both updatable block-level deduplication and public auditing. In this paper, an updatable block-level deduplication scheme with efficient auditing is proposed based on a tree-based authenticated structure. In the proposed scheme, the cloud server(CS) can perform block-level deduplication, and the TPA achieves integrity auditing tasks. When a data block is updated, the ciphertext and auditing tags could be updated efficiently. The security analysis demonstrates that the proposed scheme can achieve privacy under chosen distribution attacks in secure deduplication and resist uncheatable chosen distribution attacks(UNC-CDA) in proof of ownership(PoW). Furthermore, the integrity auditing process is proven secure under adaptive chosen-message attacks. Compared with previous relevant schemes, the proposed scheme achieves better functionality and higher efficiency.
基金supported by the National Natural Science Foundation of China (61472470)the Science and Technology Bureau Project of Weiyang District of Xi’an City (201403)the National Natural Science Foundation of Shaanxi Province (2014JM2-6091, 2015JQ1007)
文摘Ciphertext-policy attribute-based searchable encryption (CP-ABSE) can achieve fine-grained access control for data sharing and retrieval, and secure deduplication can save storage space by eliminating duplicate copies. However, there are seldom schemes supporting both searchable encryption and secure deduplication. In this paper, a large universe CP-ABSE scheme supporting secure block-level deduplication are proposed under a hybrid cloud mechanism. In the proposed scheme, after the ciphertext is inserted into bloom filter tree (BFT), private cloud can perform fine-grained deduplication efficiently by matching tags, and public cloud can search efficiently using homomorphic searchable method and keywords matching. Finally, the proposed scheme can achieve privacy under chosen distribution attacks block-level (PRV-CDA-B) secure deduplication and match-concealing (MC) searchable security. Compared with existing schemes, the proposed scheme has the advantage in supporting fine-grained access control, block-level deduplication and efficient search, simultaneously.