SeDaSC: Secure Data Sharing in Clouds

被引:129
作者
Ali, Mazhar [1 ]
Dhamotharan, Revathi [1 ]
Khan, Eraj [2 ]
Khan, Samee U. [1 ]
Vasilakos, Athanasios V. [3 ]
Li, Keqin [4 ]
Zomaya, Albert Y. [5 ]
机构
[1] North Dakota State Univ, Coll Engn, Dept Elect & Comp Engn, Fargo, ND 58108 USA
[2] COMSATS Inst Informat Technol, Dept Comp Sci, Abbottabad 22060, Pakistan
[3] Kuwait Univ, Coll Comp Sci & Engn, Dept Comp Sci, Safat 13060, Kuwait
[4] SUNY Coll New Paltz, Sch Sci & Engn, Dept Comp Sci, New Paltz, NY 12561 USA
[5] Univ Sydney, Sch Informat Technol, Sydney, NSW 2006, Australia
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Access control; cloud computing; high-level Petri nets (HLPNs); modeling; Satisfiability Modulo Theory (SMT); Scyther; verification; PRIVACY;
D O I
10.1109/JSYST.2014.2379646
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-specific and conventional insider threats. Secure data sharing among a group that counters insider threats of legitimate yet malicious users is an important research issue. In this paper, we propose the Secure Data Sharing in Clouds (SeDaSC) methodology that provides: 1) data confidentiality and integrity; 2) access control; 3) data sharing (forwarding) without using compute-intensive reencryption; 4) insider threat security; and 5) forward and backward access control. The SeDaSC methodology encrypts a file with a single encryption key. Two different key shares for each of the users are generated, with the user only getting one share. The possession of a single share of a key allows the SeDaSC methodology to counter the insider threats. The other key share is stored by a trusted third party, which is called the cryptographic server. The SeDaSC methodology is applicable to conventional and mobile cloud computing environments. We implement a working prototype of the SeDaSC methodology and evaluate its performance based on the time consumed during various operations. We formally verify the working of SeDaSC by using high-level Petri nets, the Satisfiability Modulo Theories Library, and a Z3 solver. The results proved to be encouraging and show that SeDaSC has the potential to be effectively used for secure data sharing in the cloud.
引用
收藏
页码:395 / 404
页数:10
相关论文
共 15 条
[1]   A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds [J].
Abbas, Assad ;
Khan, Samee U. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) :1431-1441
[2]  
Alhamazani K., 2014, IN PRESS, P1, DOI [10.1007/s00607-014-0398-5, DOI 10.1007/S00607-014-0398-5]
[3]  
[Anonymous], 2011, SEC GUID CRIT AR FOC
[4]  
[Anonymous], P 12 INT C SCALCOM C
[5]  
[Anonymous], 2012, P 7 ACM S INFORM COM
[6]   Fast and Scalable Multi-Way Analysis of Massive Neural Data [J].
Chen, Dan ;
Li, Xiaoli ;
Wang, Lizhe ;
Khan, Samee U. ;
Wang, Juan ;
Zeng, Ke ;
Cai, Chang .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (03) :707-719
[7]  
Chen Y., P IEEE INFOCOM, P1952
[8]   Satisfiability Modulo Theories: An Appetizer [J].
de Moura, Leonardo ;
Bjorner, Nikolaj .
FORMAL METHODS: FOUNDATIONS AND APPLICATIONS, 2009, 5902 :23-36
[9]  
Gutmann P., 1996, SSYM 96, V6, P8
[10]   Incremental proxy re-encryption scheme for mobile cloud computing environment [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Madani, Sajjad A. ;
Ali, Mazhar ;
Khan, Atta Ur Rehman ;
Shamshirband, Shahaboddin .
JOURNAL OF SUPERCOMPUTING, 2014, 68 (02) :624-651