Secure Cloud Storage Model Based on Threshold Public Key Encryption and Erasure Codes over Exponents
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (61440014); Liaoning Province Doctor Startup Fundunder (20141012); Fundamental Research Funds for the Central Universitie (N151704002); Shenyang Science and Technology Plan Projects (F14-231-1-08)

  • Article
  • | |
  • Metrics
  • |
  • Reference [26]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    The analysis and research described in this paper aim at solving the problem of data confidentiality and fault-tolerant in cloud storage environments. It first shows that the existing solutions can either solve the problem of confidentiality or fault tolerance, but are not able to take both for consideration. In order to solve the problems, the paper proposes a secure cloud storage system with data confidentiality and fault-tolerant (SCSM-DCF),which is based on threshold public key encryption scheme and erasure codes over exponents. The formal definition, security definition, and communication protocols between entities are given in this paper. Finally, the performance of the model is analyzed, and the result indicates that the model is not only correct and secure, but also has the higher efficiency.

    Reference
    [1] Li H, Sun WH, Li FH, Wang BY. Secure and privacy-preserving data storage service in public cloud. Journal of Computer Research and Development, 2014,51(7):1397-1409 (in Chinese with English abstract).
    [2] Fu YX, Luo SM, Shu JW. Survey of secure cloud storage system and key technologies. Journal of Computer Research and Development, 2013,50(1):136-145 (in Chinese with English abstract).
    [3] Feng DG, Zhang M, Zhang Y, Xu Z. Study on cloud computing security. Ruan Jian Xue Bao/Journal of Software, 2011, 22(1):71-83 (in Chinese with English abstract). [doi: 10.3724/SP.J.1001.2011.03958]
    [4] Julisch K, Hall M. Security and control in the cloud. Information Security Journal: A Global Perspective, 2010,19(6):299-309. [doi: 10.1080/19393555.2010.514654]
    [5] Yu NH, Hao Z, Xu JJ, Zhang WM, Zhang C. Review of cloud computing security. Acta Electronica Sinica, 2013,41(2):371-381 (in Chinese with English abstract).
    [6] Padilha R, Pedone F. Confidentiality in the cloud. IEEE Security & Privacy, 2015,13(1):57-60. [doi: 10.1109/MSP.2015.4]
    [7] Wang HB, Cao ZF, Wang LC. Multi-Use and unidirectional identity-based proxy re-encryption. Information Sciences, 2010, 180(20):4042-4059. [doi: 10.1016/j.ins.2010.06.029]
    [8] Zhu WT. Towards secure and communication-efficient broadcast encryption systems. Journal of Network and Computer Applications, 2013,36(1):178-186. [doi: 10.1016/j.jnca.2012.09.007]
    [9] Wei HJ, Liu WF, Hu XX. Forward-Secure ciphertext-policy attribute-based encryption scheme. Journal on Communications, 2014, 35(7):38-45 (in Chinese with English abstract).
    [10] Gentry C. Fully homomorphic encryption using ideal lattices. In: Proc. of the STOC 2009. Bethesda: ACM Press, 2009. 169-178. [doi: 10.1145/1536414.1536440]
    [11] Boneh D, Crescenzo GD, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Proc. of the EUROCRYPT 2004. Interlaken: Springer-Verlag, 2004. 506-522. [doi: 10.1007/978-3-540-24676-3_30]
    [12] Li J, Wang Q, Wang C, Cao N, Ren K , Lou WJ. Fuzzy key word search over encrypted data in cloud computing. In: Proc. of the INFOCOM 2010. San Diego: IEEE Press, 2010. 441-445. [doi: 10.1109/INFCOM.2010.5462196]
    [13] Wang C, Cao N, Li J, Ren K, Lou WJ. Secure ranked keyword search over encrypted cloud data. In: Proc. of the ICDCS 2010. Genova: IEEE Computer Society, 2010. 253-262. [doi: 10.1109/ICDCS.2010.34]
    [14] Cao N, Wang C, Li M, Ren K, Lou WJ. Privacy-Preserving multi-keyword ranked search over encrypted cloud data. In: Proc. of the INFOCOM. Shanghai: IEEE Computer Society, 2011. 829-837. [doi: 10.1109/INFCOM.2011.5935306]
    [15] Li M, Yu SC, Cao N, Lou WJ. Authorized private keyword search over encrypted data in cloud computing. In: Proc. of the ICDCS 2011. Minneapolis: IEEE Computer Society, 2011. 383-392. [doi: 10.1109/ICDCS.2011.55]
    [16] Tan PX, Chen Y, Lan JL, Jia HY. Secure fault-tolerant code for cloud storage. Journal on Communications, 2014,35(3):109-115 (in Chinese with English abstract).
    [17] Weatherspoon H, Kubiatowicz JD. Erasure coding vs. replication: A quantitative comparison. In: Proc. of the 1st Int'l Workshop on Peer to Peer Systems. Cambridge: Springer-Verlag, 2002. 328-337. [doi: 10.1007/3-540-45748-8_31]
    [18] Yang DR, Wang Y, Liu P. Fault-Tolerant mechanism combined with replication and error correcting code for cloud file systems. Journal of Tshinghua University (Sci. & Technol.), 2014,54(1):137-144 (in Chinese with English abstract).
    附中文参考文献:
    [1] 李晖,孙文海,李凤华,王博洋.公共云存储服务数据安全及隐私保护技术综述.计算机研究与发展,2014,51(7):1397-1409.
    [2] 傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述.计算机研究与发展,2013,50(1):136-145.
    [3] 冯登国,张敏,张妍,徐震.云计算安全研究.软件学报,2011,22(1):71-83. [doi: 10.3724/SP.J.1001.2011.03958]
    [5] 俞能海,郝卓,徐甲甲,张卫明,张驰.云安全研究进展综述.电子学报,2013,41(2):371-381.
    [9] 魏江宏,刘文芬,胡学先.前向安全的密文策略基于属性加密方案.通信学报,2014,35(7):38-45.
    [16] 谭鹏许,陈越,兰巨龙,贾洪勇.用于云存储的安全容错编码.通信学报,2014,35(3):109-115.
    [18] 杨东日,王颖,刘鹏.一种副本复制和纠错码融合的云存储文件系统容错机制.清华大学学报(自然科学版),2014,54(1):137-144.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

徐剑,李坚,韩健,李福祥,周福才.融合门限公钥加密和纠删码的安全云存储模型.软件学报,2016,27(6):1463-1474

Copy
Share
Article Metrics
  • Abstract:4965
  • PDF: 6947
  • HTML: 2994
  • Cited by: 0
History
  • Received:August 15,2015
  • Revised:October 09,2015
  • Online: January 22,2016
You are the first2032028Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063