Skip to main content

Secure and Efficient Sensitive Info-Hiding for Data Sharing via DACES Method in Cloud

  • Conference paper
  • First Online:
Intelligence in Big Data Technologies—Beyond the Hype

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1167))

  • 1020 Accesses

Abstract

Cloud computing has been developed very quickly within the past few years. With public cloud storage services, users can store remotely to servers in cloud and also recognize the sharing of data with other users. The public cloud servers cannot be completely trusted by users and cannot manage records kept on cloud like local storage devices. However, within cloud storage systems, stored data would possibly contain sensitive info which should not be visible to other users while sharing record in cloud. This becomes a challenge to realize secure and efficient information sharing within cloud. However, existing cryptographic mechanisms do not protect shared sensitive data which are typically protected using a low-entropy password. To tackle this, Division and Auditing of information in Cloud for Efficiency and Security (DACES) is recommended in order to treat the above issues for public cloud storage. In DACES: (i) Erasure code is applied to divide a single record into blocks and distributed them to different cloud servers. (ii) Privacy of data owner and data sharing with sensitive info-hiding is achieved by secure data integrity auditing scheme. (iii) Identity-based access management is implemented to recognize that only authorized users will access the sensitive information. Furthermore, the proposed method is secure and efficient for information sharing in cloud environment. At last, its application is in electronic health (E-health) record.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Q. Zhang, L. Cheng, R. Boutaba, Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)

    Article  Google Scholar 

  2. K. Ren, C. Wang, Q. Wang, Security challenges for the public cloud. IEEE Internet Comput. 6(1), 69–73 (2012)

    Article  Google Scholar 

  3. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in Proceedings of the 14th ACM Conference on Computer and Communications Security (2007), pp. 598–609

    Google Scholar 

  4. A. Juels, B.S. Kaliski, Pors: proofs of retrievability for large files, in Proceedings of the 14th ACM Conference on Computer and Communications Security (2007), pp. 584–597

    Google Scholar 

  5. H. Shacham, B. Waters, Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)

    Article  MathSciNet  Google Scholar 

  6. C. Wang, S.S.M. Chow, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  7. S.G. Worku, C. Xu, J. Zhao, X. He, Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng. 40(5), 1703–1713 (2014)

    Article  Google Scholar 

  8. C. Guan, K. Ren, F. Zhang, F. Kerschbaum, J. Yu, Symmetric-key based proofs of retrievability supporting public verification, in Computer Security—ESORICS 2015 (Springer International Publishing, Cham, 2015), pp. 203–223

    Google Scholar 

  9. W. Shen, J. Yu, H. Xia, H. Zhang, X. Lu, R. Hao, Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)

    Article  Google Scholar 

  10. J. Sun, Y. Fang, Cross-domain data sharing in distributed electronic health record systems. IEEE Trans. Parallel Distrib. Syst. 21(6), 754–764 (2010)

    Article  Google Scholar 

  11. K. Ren, C. Wang, Q. Wang, Security challenges for the public cloud. IEEE Internet Comput. 1, 69–73 (2012)

    Article  Google Scholar 

  12. L. Zhou, Y. Zhu, A. Castiglione, Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner. Comput. Secur. 69, 84–96 (2017)

    Article  Google Scholar 

  13. S. Hu, Q. Wang, J. Wang, Z. Qin, K. Ren, Securing SIFT: privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans. Image Process. 25(7), 3411–3425 (2016)

    Article  MathSciNet  Google Scholar 

  14. H.-M. Sun, Y.-H. Chen, Y.-H. Lin, oPass: a user authentication protocol resistant to password stealing and password reuse attacks. IEEE Trans. Inf. Forensics Secur. 7(2), 651–663 (2012)

    Article  Google Scholar 

  15. L. Harn, J. Ren, Generalized digital certificate for user authentication and key establishment for secure communications. IEEE Trans. Wirel. Commun. 10(7), 2372–2379 (2011)

    Article  Google Scholar 

  16. A. Juels, A. Opera, New approaches to security and availability for cloud data. Commun. ACM 56(2), 64–73 (2013)

    Article  Google Scholar 

  17. G. Kappes, A. Hatzieleftheriou, S.V. Anastasiadis, Dike: Virtualization-Aware Access Control for Multitenant Filesystems (Technical Report No. DCS2013-1) (University of Ioannina, Greece, 2013)

    Google Scholar 

  18. M. Ali, K. Bilal, U. Khan, B. Veeravalli, K. Li, Y. Zomaya, DROPS: division and replication of data in cloud for optimal performance and security. IEEE Trans. Cloud Comput. 6(2) (2018)

    Google Scholar 

  19. D. Zissis, D. Lekkas, Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  20. H. Wang, Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015)

    Article  Google Scholar 

  21. Y. Yu, M.H. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, G. Min, Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)

    Article  Google Scholar 

  22. J.S. Raj, C. Amal, Sharing visual secrets with click points encryption. Int. J. Appl. Eng. Res. 11(9) (2016)

    Google Scholar 

  23. J.S. Raj, J.J. Praise, Virtual private network (VPN) with VShield based firewall and packet matching for security cloud infrastructure. Tierärztl. Prax. 39(10) (2019)

    Google Scholar 

  24. G. Ateniese, D.H. Chou, B. de Medeiros, G. Tsudik, Sanitizable signatures, in Proceedings of the 10th European Conference on Research in Computer Security, ser. ESORICS’05 (Springer-Verlag, Berlin, Heidelberg, 2005), pp. 159–177

    Google Scholar 

  25. G. Ateniese, B. de Medeiros, On the key exposure problem in chameleon hashes, in Security in Communication Networks (Springer Berlin Heidelberg, Berlin, Heidelberg, 2005), pp. 165–179

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Jeya Praise .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Raj, R.J.S., Praise, J.J., Prakash, M.V., Silva, A.S. (2021). Secure and Efficient Sensitive Info-Hiding for Data Sharing via DACES Method in Cloud. In: Peter, J., Fernandes, S., Alavi, A. (eds) Intelligence in Big Data Technologies—Beyond the Hype. Advances in Intelligent Systems and Computing, vol 1167. Springer, Singapore. https://doi.org/10.1007/978-981-15-5285-4_62

Download citation

Publish with us

Policies and ethics