You are not logged in.

A secure and efficient data sharing framework with delegated capabilities in hybrid cloud

Liu, Xuejiao, Xia,Yingjie, Xiang, Yang, Hassan, Mohammad M. and Alelaiwi, Abdulhameed 2015, A secure and efficient data sharing framework with delegated capabilities in hybrid cloud, in SocialSec 2015 : Proceedings of the Security and Privacy in Social Networks and Big Data 2015 Symposium, IEEE, Piscataway, N.J., pp. 7-14, doi: 10.1109/SocialSec2015.13.

Attached Files
Name Description MIMEType Size Downloads

Title A secure and efficient data sharing framework with delegated capabilities in hybrid cloud
Author(s) Liu, Xuejiao
Xia,Yingjie
Xiang, YangORCID iD for Xiang, Yang orcid.org/0000-0001-5252-0831
Hassan, Mohammad M.
Alelaiwi, Abdulhameed
Conference name Security and Privacy in Social Networks and Big Data. Symposium (2015 : Hangzhou, China)
Conference location Hangzhou, China
Conference dates 16-18 Nov. 2015
Title of proceedings SocialSec 2015 : Proceedings of the Security and Privacy in Social Networks and Big Data 2015 Symposium
Editor(s) [Unknown]
Publication date 2015
Conference series Security and Privacy in Social Networks and Big Data Symposium
Start page 7
End page 14
Total pages 8
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) attribute-based encryption
hybrid cloud
anonymous key agreement protocol
Summary Hybrid cloud is a widely used cloud architecture in large companies that can outsource data to the publiccloud, while still supporting various clients like mobile devices. However, such public cloud data outsourcing raises serious security concerns, such as how to preserve data confidentiality and how to regulate access policies to the data stored in public cloud. To address this issue, we design a hybrid cloud architecture that supports data sharing securely and efficiently, even with resource-limited devices, where private cloud serves as a gateway between the public cloud and the data user. Under such architecture, we propose an improved construction of attribute-based encryption that has the capability of delegating encryption/decryption computation, which achieves flexible access control in the cloud and privacy-preserving in datautilization even with mobile devices. Extensive experiments show the scheme can further decrease the computational cost and space overhead at the user side, which is quite efficient for the user with limited mobile devices. In the process of delegating most of the encryption/decryption computation to private cloud, the user can not disclose any information to the private cloud. We also consider the communication securitythat once frequent attribute revocation happens, our scheme is able to resist some attacks between private cloud and data user by employing anonymous key agreement.
ISBN 9781467384209
Language eng
DOI 10.1109/SocialSec2015.13
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2015, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30084559

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 141 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Thu, 30 Jun 2016, 17:15:04 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.