• Title/Summary/Keyword: Cloud Data Sharing

Search Result 149, Processing Time 0.028 seconds

A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud

  • Hwang, Yong-Woon;Kim, Taehoon;Seo, Daehee;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4042-4061
    • /
    • 2022
  • Recently, various security threats such as data leakage and data forgery have been possible in the communication and storage of data shared in the cloud environment. This paper conducted a study on the CP-ABSC scheme to solve these security threats. In the existing CP-ABSC scheme, if the data is obtained by the unsigncryption of the data user incorrectly, the identity of the data owner who uploaded the ciphertext cannot be known. Also, when verifying the leaked secret key, the identity information of the data user who leaked the secret key cannot be known. In terms of efficiency, the number of attributes can affect the ciphertext. In addition, a large amount of computation is required for the user to unsigncrypt the ciphertext. In this paper, we propose ECP-ABSC that provides data user traceability, and use it in a cloud environment to provide an efficient and secure data sharing scheme. The proposed ECP-ABSC scheme can trace and verify the identity of the data owner who uploaded the ciphertext incorrectly and the data user who leaked the secret key for the first time. In addition, the ciphertext of a constant size is output and the efficiency of the user's unsigncryption computation were improved.

The Design of Integrated system for the cloud-based medical Information sharing

  • Lee, Kwang-Cheol;Hwang, Chigon;Lee, Seong Ro;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.145-153
    • /
    • 2015
  • Development of IT technology, in combination with the medical area, a number of developments have been made of the digital advanced medical devices, also increased interest in health, sharing of medical information has become increasingly necessary. Standardization for medical information sharing to satisfy these requirements have been studied. However, the medical information system is to build a system independent hospital itself, is difficult to share and exchange medical data with other medical institutions. In this paper, we provide a medical cloud system that can share medical information. Use DBaaS of cloud services. And is an international standard to have a HL7 share information by forming a meta-schema, each of the data transfer, the format of the document oriented data solves the heterogeneity between hospitals. Extracts the required field name of examination information, to exchange information with each of the local information and mapping. Health diagnostic information in the present study and diagnosis through accurate information sharing and exchange is possible ongoing management.

A Fast and Secure Scheme for Data Outsourcing in the Cloud

  • Liu, Yanjun;Wu, Hsiao-Ling;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2708-2721
    • /
    • 2014
  • Data outsourcing in the cloud (DOC) is a promising solution for data management at the present time, but it could result in the disclosure of outsourced data to unauthorized users. Therefore, protecting the confidentiality of such data has become a very challenging issue. The conventional way to achieve data confidentiality is to encrypt the data via asymmetric or symmetric encryptions before outsourcing. However, this is computationally inefficient because encryption/decryption operations are time-consuming. In recent years, a few DOC schemes based on secret sharing have emerged due to their low computational complexity. However, Dautrich and Ravishankar pointed out that most of them are insecure against certain kinds of collusion attacks. In this paper, we proposed a novel DOC scheme based on Shamir's secret sharing to overcome the security issues of these schemes. Our scheme can allow an authorized data user to recover all data files in a specified subset at once rather than one file at a time as required by other schemes that are based on secret sharing. Our thorough analyses showed that our proposed scheme is secure and that its performance is satisfactory.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing

  • Guangwei Xu;Chen Wang;Shan Li;Xiujin Shi;Xin Luo;Yanglan Gan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.998-1019
    • /
    • 2024
  • Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.

Data Share System using Zing Application in the Cloud Environment (Cloud 환경에서 Zing을 활용한 데이터 공유 시스템)

  • Moon, Seok-Jae;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.227-229
    • /
    • 2014
  • Recent share large amounts of data in a mobile network environment for the efficient service environment by using Cloud services are being made information sharing. At that time, the data communication transmission technology is a wide area, narrow-area communication, proximity communication with a second type, and the second near field communication in the mobile NFC capable mobile devices mainly used in In this paper, an extension of local area network technology, Zing NFC technology using techniques to share large amounts of data efficiently, a system is proposed. Cloud proposed system is the proximity of sharing information between terminals which may occur when the problem was solved interoperability.

  • PDF

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

A Secure Data Transmission Scheme Based on Secret Sharing for the Maritime Cloud Environment (해사클라우드 환경에 적합한 비밀분산 기반의 안전한 데이터 전송 기법)

  • Lee, Donghyeok;Park, Namje
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.4
    • /
    • pp.232-237
    • /
    • 2017
  • The Maritime Cloud is a technology that enables the seamless exchange of information between several communication links in the maritime domain. Although research on The Maritime Cloud security is still at an early stage, furthering this knowledge is vital to securing the marine environment. In this paper, we propose a method for secure data transmission through The Maritime Cloud domain. The proposed technique, based on the "secret sharing" scheme, is delivered through specifically-dedicated geocasting software. Thus, only authorized vessels can restore the original information. The proposed method is safe from so-called "sniffing" and "man-in-the-middle" attacks.

Computing Resource Sharing and Utilization System for Efficient Research Data Utilization (연구데이터 활용성 극대화 위한 컴퓨팅 리소스 공유활용 체계)

  • Song, Sa-kwang;Cho, Minhee;Lee, Mikyoung;Yim, Hyung-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.430-432
    • /
    • 2022
  • With the recent increase in interest in the open science movement in science and technology fields such as open access, open data, and open source, the movement to share and utilize publicly funded research products is materializing and revitalizing. In line with this trend, many efforts are being made to establish and revitalize a system for sharing and utilizing research data, which is a key resource for research in Korea. These efforts are mainly focused on collecting research data by field and institution, and linking it with DataON, a national research data platform, to search and utilize it. However, developed countries are building a system that can share and utilize not only such research data but also various types of R&D-related computing resources such as IaaS, PaaS, SaaS, and MLaaS. EOSC (European Open Science Cloud), ARDC (Australian Research Data Commons), and CSTCloud (China S&T Cloud) are representative examples. In Korea, the Korea Research Data Commons (KRDC) is designed and a core framework is being developed to facilitate the sharing of these computing resources. In this study, the necessity, concept, composition, and future plans of KRDC are introduced.

  • PDF

Data Sharing Technique between Heterogeneous based on Cloud Service (클라우드 서비스 기반 이기종간의 데이터 공유 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.391-398
    • /
    • 2018
  • There are many problems caused by data sharing between general heterogeneous digital devices due to various interfaces. To solve this problem, this paper proposes heterogeneous data sharing with cloud service and mobile through D2D communication that supports communication between different devices. The proposed technique is used to reduce the load on the server to perform data synchronization. Also, in order to minimize data latency caused by data replication between different devices, a technique to enhance the speed of data writing with copying only the modified parts in the chunk list is adopted and cloud service model integrated with mobile environment is realized in order to minimize the network bandwidth consumed for synchronization for data sharing. Therefore, it is possible to share data in different spaces efficiently with maintaining data integrity and minimizing latency in data.