Abstract
Users are motivated to outsource their data into the cloud for its great flexibility and economic saving. However, outsourcingdata to cloud also increases the risk of privacy leak.A straightforward method to protect the users’privacy is to encrypt the files before outsourcing.The existing group key management methods always presume that the server is trustworthy, but cloud storage applications do not meet this condition. Therefore, how to manage the group key to enable authenticated usersto access the files securely and efficientlyis still a challenging problem.In our paper, wepropose a Time-basedGroup Key Management (TGKM)algorithmforcryptographiccloud storage applications, which uses the proxy re-encryption algorithm to transfermajorcomputingtask of the group key management to the cloud server.So, the proposed TGKM scheme greatly reduces the user’s computation and storage overhead and makes full use of cloud server to achieve an efficient group key management for the cryptographic cloud storage applications.Moreover, we introduce a key seed mechanism to generate a time-based dynamic group key which effectively strengthens the cloud data security. Our security analysis and performance evaluations both show that the proposed TGKM scheme is a secure and efficient group key management protocol for the cloud storage applications with low overheads of computation and communication.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable and fine-grained data ac-cess control in cloud computing. In: Proceedings of IEEE INFOCOM 2010, pp. 15–19 (2010)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)
Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010)
Hong, C., lv, Z., Zhang, M., Feng, D.: A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage. In: Wang, H., Li, S., Oyama, S., Hu, X., Qian, T. (eds.) WAIM 2011. LNCS, vol. 6897, pp. 264–276. Springer, Heidelberg (2011)
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proc. of VLDB 2007, Vienna, Austria (2007)
Xiao, D., Shu, J.-W., Xue, W., Liu, Z.-C., Zheng, W.-M.: Design and implementation of a group key server-based cryptographic file system. Chinese Journal of Computers 31(4), 600–610 (2008)
Goh, E.-J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing Remote Untrusted Storage. In: NDSS 2003 (2003)
Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1), 60–96 (2004)
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: NDSS 2005 (2005)
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. The Chinese remainder theorem, sec.31.5, pp. 873–876. MIT Press and McGraw-Hill (2001) ISBN 0-262-03293-7
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: 28th IEEE Symposium on Security and Privacy 2007, pp. 321–334 (2007)
Yang, Y.R., Lam, S.S.: A Secure Group Key Management Communication Lower Bound, University of Texas at Austin, Austin, TX (2000)
Günther, C.G.: An identity-based key-exchange protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 29–37. Springer, Heidelberg (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Cui, Y., Peng, Z., Song, W., Li, X., Cheng, F., Ding, L. (2014). A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage. In: Chen, L., Jia, Y., Sellis, T., Liu, G. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8709. Springer, Cham. https://doi.org/10.1007/978-3-319-11116-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-11116-2_11
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11115-5
Online ISBN: 978-3-319-11116-2
eBook Packages: Computer ScienceComputer Science (R0)