首页> 外文会议>International Conference on Inventive Research in Computing Applications >A Lightweight Secure Data Sharing Scheme For Distributed Cloud Environment
【24h】

A Lightweight Secure Data Sharing Scheme For Distributed Cloud Environment

机译:分布式云环境的轻量级安全数据共享方案

获取原文

摘要

Cloud computing offers enormous benefits to its adopters, but it also comes with its set of problems and inefficiencies of which security is the biggest concern. In order to leverage a remote cloud based infrastructure, a company essentially gives away private data and information that might be sensitive and confidential. Secret sharing schemes are used to restrict access to such sensitive and confidential data. Threshold secret sharing schemes is a scheme in which the number of the participants in the reconstruction phase is important for recovering the secret. In this paper, aiming at tackling the important issue of identity revocation, we are introducing the outsourcing computation into IBE and suggest a revocable IBE scheme should be added in the server-aided setting. Our proposed scheme delivers most of the key generation related operations i.e. key-issuing and Key update processes are performed by Key Update Cloud Service Provider, leaving only a fixed number of simple operations for PKG and users to perform locally. By utilizing a novel collusion-resistant technique, this goal is achieved: we make use of a hybrid private key for each user, in which an AND gate is drawn in to attach and bound the identity component and the time component. In addition, we propose another technique which is verifiable secure under the recently formulized Refereed Delegation of Computation model. To end with, we provide extensive experimental results to reveal the effectiveness of our proposed construction.
机译:云计算为其采用者带来了巨大的好处,但同时也带来了一系列问题和效率低下的问题,其中安全是最大的问题。为了利用基于远程云的基础架构,公司实质上会泄露可能敏感且机密的私人数据和信息。秘密共享方案用于限制对此类敏感和机密数据的访问。阈值秘密共享方案是一种方案,其中重建阶段的参与者数量对于恢复秘密很重要。在本文中,为了解决身份吊销的重要问题,我们将外包计算引入IBE中,并建议在服务器辅助环境中添加可撤消的IBE方案。我们提出的方案提供了大多数与密钥生成相关的操作,即密钥发布和密钥更新过程由密钥更新云服务提供商执行,仅保留了一定数量的简单操作供PKG和用户在本地执行。通过使用一种新颖的防串通技术,可以实现此目标:我们为每个用户使用了一个混合私钥,其中引入了一个“与”门来附加和绑定身份分量和时间分量。此外,我们提出了另一种技术,该技术在最近制定的计算引用模型委托模型下可验证安全。最后,我们提供了广泛的实验结果以揭示我们提出的构造的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号