Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 28, Issue 2 (2017)
  4. Data Sharing Scheme for Cloud Storage Se ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • More
    Article info Full article Related articles

Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery
Volume 28, Issue 2 (2017), pp. 375–386
Jen-Ho Yang   Iuon-Chang Lin   Po-Ching Chien  

Authors

 
Placeholder
https://doi.org/10.15388/Informatica.2017.134
Pub. online: 1 January 2017      Type: Research Article      Open accessOpen Access

Received
1 September 2015
Accepted
1 November 2016
Published
1 January 2017

Abstract

The popularity of sharing data through cloud services has increased these days. As a result, the security of data sharing has become an important issue. The security mechanism has to ensure that the shared data would not be intercepted or altered by illegal members during transmission. A data sharing scheme for cloud services is proposed in this paper to achieve the following four security requirements: 1) forward secrecy and backward secrecy, 2) source authentication, 3) data integrity, and 4) confidentiality. In addition, message recovery is applied to improve the efficiency of encryption and signature computation. The computation cost is reduced by computing a common key for all data. Thus, the data owner only needs to encrypt the shared data once before sending it in this proposed scheme.

References

 
Almorsy, M., Grundy, J., Ibrahim, A.S. (2011). Collaboration-based cloud computing security management framework. In: IEEE 4th International Conference on Cloud Computing, pp. 364–371.
 
Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M. (2002). Efficient algorithms for pairing-based crytosystems. In: Proceedings of Advances in Cryptology-Brypto 2002, Lecture Notes inComputer Science, Vol. 2442, pp. 354–368.
 
Bonehand, D., Franklin, M. (2001). Identity-based encryption from the weil pairings. In: Proceedings of Advances in Cryptology-Crypto 2001, Lecture Notes in Computer Science, Vol. 2139, pp. 213–229.
 
Ghazia, U., Masood, R. (2012). Comparative analysis of access control systems on cloud. In: Proceedings of ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD), pp. 8–10.
 
Han, J., Susilo, W., Mu, W. (2013). Identity-based data storage in cloud computing. Future Generation Computer Systems, 29, 673–681.
 
Hay, B., Nance, K.L., Bishop, M. (2011). Storm Clouds Rising: Security Challenges for IaaS Cloud Computing. HICSS. IEEE Computer Society, pp. 1–7.
 
Joux, A. (2002). The weil and tate airings as building blocks for public key cryptosystems. In: Proceedings of the Algorithmic Number Theory Symposium (ANTS-V2002), Lecture Notes in Computer Science, Vol. 2369, pp. 20–32.
 
Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203–209.
 
Lin, I.C., Chang, C.C. (2008). A novel digital signature scheme for application of document review in a linearly hierarchical organization. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1367–1370.
 
Lin, I.C., Yang, J.H. (2012). Improving computation efficiency of source authentication by elliptic curve cryptosystem. Journal of Electronic Science and Technology, 10(3), 227–231.
 
Lin, I.C., Chang, P.Y., Chang, C.C. (2010). A key management scheme for sensor networks using bilinear pairings and gap Deffie–Hellman group. International Journal of Innovative Computing, Information and Control, 6(2), 809–816.
 
Miller, V.S. (1986). Use of elliptic curves in cryptography. In: Ed, W.H.C. (Ed.), Advances in Cryptology – CRYPTO ’85 Proceedings, CRYPTO 1985, Lecture Notes in Computer Science, Vol. 218, Springer, Berlin.
 
Nyberg, K., Ruppel, R.A. (1993). A new signature scheme based on the DSA giving message recovery. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 58–61.
 
Wang, L., Wu, C.K. (2005). Efficient identity-based multicast scheme from bilinear pairing. IEE Proceedings Communications, 152(6), 877–882.
 
Zhang, F., Safavi-Naini, R., Susilo, W. (2004). An efficient signature scheme from bilinear pairings and its applications. In: Proceedings on Lecture Notes in Computer Science (LNCS), Vol. 2947, pp. 277–290.
 
Zhao, G., Rong, C., Li, J., Zhang, F., Tang, Y. (2010). Trusted data sharing over untrusted cloud storage providers. In: Proceedings of 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 97–103.

Biographies

Yang Jen-Ho
jenhoyang@mail.knu.edu.tw

J.H. Yang received the BS degree in computer science and information engineering from I-Shou University, Kaoshiung in 2002, and the PhD degree in computer science and information engineering from National Chung Cheng University, Chiayi County in 2009. Since 2009, he has been an associate professor with the Department of Multimedia and Mobile Commerce in Kainan University, Taoyuan. His current research interests include electronic commerce, information security, cryptography, authentication for wireless environments, digital right management, and fast modular multiplication algorithm.

Lin Iuon-Chang
iclin@nchu.edu.tw

I.C. Lin received the BS in computer and information sciences from Tung Hai University, Taichung, Taiwan, Republic of China, in 1998; the MS in information management from Chaoyang University of Technology, Taiwan, in 2000. He received his PhD in computer science and information engineering in March 2004 from National Chung Cheng University, Chiayi, Taiwan. He is currently a professor of the Department of Management Information Systems, National Chung Hsing University, and Department of Photonics and Communication Engineering, Asia University, Taichung, Taiwan, ROC. His current research interests include electronic commerce, information security, cryptography, and mobile communications.

Chien Po-Ching

P.C. Chien received the MS in the Department of Management Information Systems, National Chung Hsing University, Chiayi, Taiwan. The main research interest is connected with the problem of information security.


Full article Related articles PDF XML
Full article Related articles PDF XML

Copyright
© 2017 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
bilinear pairing message recovery data sharing cloud storage

Metrics
since January 2020
1058

Article info
views

557

Full article
views

446

PDF
downloads

229

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy