Abstract
Cloud computing has been developed very quickly within the past few years. With public cloud storage services, users can store remotely to servers in cloud and also recognize the sharing of data with other users. The public cloud servers cannot be completely trusted by users and cannot manage records kept on cloud like local storage devices. However, within cloud storage systems, stored data would possibly contain sensitive info which should not be visible to other users while sharing record in cloud. This becomes a challenge to realize secure and efficient information sharing within cloud. However, existing cryptographic mechanisms do not protect shared sensitive data which are typically protected using a low-entropy password. To tackle this, Division and Auditing of information in Cloud for Efficiency and Security (DACES) is recommended in order to treat the above issues for public cloud storage. In DACES: (i) Erasure code is applied to divide a single record into blocks and distributed them to different cloud servers. (ii) Privacy of data owner and data sharing with sensitive info-hiding is achieved by secure data integrity auditing scheme. (iii) Identity-based access management is implemented to recognize that only authorized users will access the sensitive information. Furthermore, the proposed method is secure and efficient for information sharing in cloud environment. At last, its application is in electronic health (E-health) record.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Q. Zhang, L. Cheng, R. Boutaba, Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)
K. Ren, C. Wang, Q. Wang, Security challenges for the public cloud. IEEE Internet Comput. 6(1), 69–73 (2012)
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in Proceedings of the 14th ACM Conference on Computer and Communications Security (2007), pp. 598–609
A. Juels, B.S. Kaliski, Pors: proofs of retrievability for large files, in Proceedings of the 14th ACM Conference on Computer and Communications Security (2007), pp. 584–597
H. Shacham, B. Waters, Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)
C. Wang, S.S.M. Chow, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
S.G. Worku, C. Xu, J. Zhao, X. He, Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng. 40(5), 1703–1713 (2014)
C. Guan, K. Ren, F. Zhang, F. Kerschbaum, J. Yu, Symmetric-key based proofs of retrievability supporting public verification, in Computer Security—ESORICS 2015 (Springer International Publishing, Cham, 2015), pp. 203–223
W. Shen, J. Yu, H. Xia, H. Zhang, X. Lu, R. Hao, Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)
J. Sun, Y. Fang, Cross-domain data sharing in distributed electronic health record systems. IEEE Trans. Parallel Distrib. Syst. 21(6), 754–764 (2010)
K. Ren, C. Wang, Q. Wang, Security challenges for the public cloud. IEEE Internet Comput. 1, 69–73 (2012)
L. Zhou, Y. Zhu, A. Castiglione, Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner. Comput. Secur. 69, 84–96 (2017)
S. Hu, Q. Wang, J. Wang, Z. Qin, K. Ren, Securing SIFT: privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans. Image Process. 25(7), 3411–3425 (2016)
H.-M. Sun, Y.-H. Chen, Y.-H. Lin, oPass: a user authentication protocol resistant to password stealing and password reuse attacks. IEEE Trans. Inf. Forensics Secur. 7(2), 651–663 (2012)
L. Harn, J. Ren, Generalized digital certificate for user authentication and key establishment for secure communications. IEEE Trans. Wirel. Commun. 10(7), 2372–2379 (2011)
A. Juels, A. Opera, New approaches to security and availability for cloud data. Commun. ACM 56(2), 64–73 (2013)
G. Kappes, A. Hatzieleftheriou, S.V. Anastasiadis, Dike: Virtualization-Aware Access Control for Multitenant Filesystems (Technical Report No. DCS2013-1) (University of Ioannina, Greece, 2013)
M. Ali, K. Bilal, U. Khan, B. Veeravalli, K. Li, Y. Zomaya, DROPS: division and replication of data in cloud for optimal performance and security. IEEE Trans. Cloud Comput. 6(2) (2018)
D. Zissis, D. Lekkas, Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)
H. Wang, Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015)
Y. Yu, M.H. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, G. Min, Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)
J.S. Raj, C. Amal, Sharing visual secrets with click points encryption. Int. J. Appl. Eng. Res. 11(9) (2016)
J.S. Raj, J.J. Praise, Virtual private network (VPN) with VShield based firewall and packet matching for security cloud infrastructure. Tierärztl. Prax. 39(10) (2019)
G. Ateniese, D.H. Chou, B. de Medeiros, G. Tsudik, Sanitizable signatures, in Proceedings of the 10th European Conference on Research in Computer Security, ser. ESORICS’05 (Springer-Verlag, Berlin, Heidelberg, 2005), pp. 159–177
G. Ateniese, B. de Medeiros, On the key exposure problem in chameleon hashes, in Security in Communication Networks (Springer Berlin Heidelberg, Berlin, Heidelberg, 2005), pp. 165–179
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Raj, R.J.S., Praise, J.J., Prakash, M.V., Silva, A.S. (2021). Secure and Efficient Sensitive Info-Hiding for Data Sharing via DACES Method in Cloud. In: Peter, J., Fernandes, S., Alavi, A. (eds) Intelligence in Big Data Technologies—Beyond the Hype. Advances in Intelligent Systems and Computing, vol 1167. Springer, Singapore. https://doi.org/10.1007/978-981-15-5285-4_62
Download citation
DOI: https://doi.org/10.1007/978-981-15-5285-4_62
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5284-7
Online ISBN: 978-981-15-5285-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)