Security Implications and Mitigation Strategies for One-To-Many Order Preserving Encryption in Cloud Data Search
Article Sidebar
Main Article Content
Abstract: Cloud computing offers a flexible and efficient method for data sharing, benefiting both individuals and society. However, users may hesitate to store shared data on external servers due to concerns about the sensitive nature of the information. To address this, implementing cryptographic access control is essential. Identity-based encryption (IBE) serves as a valuable cryptographic approach to establishing secure data-sharing systems. Nonetheless, access control needs to be dynamic. When a user's authorization expires, there must be a mechanism to revoke their access, ensuring they cannot retrieve either previously or newly shared data. To achieve this, we introduce the concept of Revocable-Storage Identity-Based Encryption (RS-IBE), which ensures both forward and backward security by incorporating user revocation and cipher text updates.
We further present a concrete RS-IBE construction and validate its security within a defined model. Performance comparisons highlight the scheme's advantages in functionality and efficiency, making it a viable and cost-effective solution for secure data sharing. Additionally, implementation results showcase its practical applicability. The RS-IBE scheme is proven to be adaptively secure under the decisional ℓ-DBHE assumption in the standard model. Comparative analysis confirms that our approach is efficient and functional, making it suitable for real-world applications.
Downloads
References
1. HuaqunWang; Yuqing Zhang , On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multi-cloud Storage. IEEE Transactions on Parallel and Distributed Systems Year: 2014 Volume: 25 , Issue: 1 ,Pages: 264 - 267
2. S. Vishnupriya ; P. Saranya ; A. Rajasri , Secure multi-cloud stockpiling with strategy based access control and helpful provable information ownership , Date of Conference: 27-28 Feb. 2014.
3. Lino Abraham Varghese ; S. Bose , Integrity check in multi distributed storage.
4. AnnamalaiRajendran ; V Balasubramanian ; T Mala , Integrity check utilizing Identity based Provable Data Possession in multi stockpiling cloud.
5. Jian Mao ; Yan Zhang ; Pei Li ; XiandongXu ; Teng Li ; Jianwei Liu2014 Communications Security Conference (CSC 2014), ETCIC: A mistake tolerant substance trustworthiness checking plan in multi-cloud putting away .
6. Li Haoyu ; Li Qingpeng ; Zhang Longjun ; GaoZhiqiang ,Integrity Verification Scheme for Dynamic Cloud Data Based on Multi-Branching Tree . Year: 2017 Pages: 365 - 368 IEEE Conferences
7. Boyang Wang ; Hui Li ; Xuefeng Liu ; Fenghua Li ; Xiaoqing Li , Efficient open check on the respectability of multi-proprietor information in the cloud
8. Praveena.A ;Sasikala.C ,Multi expert quality based encryption against information trustworthiness and versatility issues in cloud information administrations.
9. Su Peng ; Fucai Zhou ; Qiang Wang ; ZifengXu ; JianXu , Identity-Based Public Multi-Replica Provable Data Possession. IEEE Access Year: 2017 Volume: 5 Pages: 34-45
10. S. Ruj, M. Stojmenovic, and A. Nayak, “Decentralized access control with anonymous authentication of data stored in storages,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 384–394, 2014.
11. X. Huang, J. Liu, S. Tang, Y. Xiang, K. Liang, L. Xu, and J. Zhou, “Cost-effective authentic and anonymous data sharing with forward security,” Computers, IEEE Transactions on, 2014, doi:10.1109/TC.2014.2315619.
12. C.-K. Chu, S. S. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, “Key-aggregate cryptosystem for scalable data sharing in storage storage,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 468–477, 2014.
13. Azure. (2014) Azure storage service. [Online]. Available: http://www.windowsazure.com/
14. Amazon. (2014) Amazon simple storage service (amazon s3). [Online]. Available: http://aws.amazon.com/s3/
15. K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana, “Social cloud computing: A vision for socially motivated resource sharing,” Services Computing, IEEE Transactions on, vol. 5, no. 4, pp. 551–563, 2012.
16. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for secure storage storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–375, 2013.
17. G. Anthes, “Security in the storage,” Communications of the ACM, vol. 53, no. 11, pp. 16–18, 2010.
18. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 9, pp. 1717–1726, 2013.
19. B. Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the storage,” in INFOCOM, 2013 Proceedings IEEE. IEEE, 2013, pp. 2904–2912.

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.