Skip to main content

Secure Data Sharing for Cloud-Based Services in Hierarchical Multi-group Scenario

  • Conference paper
  • First Online:
Advances in Computational Intelligence

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 988))

Abstract

This paper proposes a cloud-based framework to enable secure data sharing among multiple groups of people organized in a hierarchy. The framework supports restrictive communication scenarios where one can define a communication policy by specifying “who can communicate to whom,” in order to respect the hierarchical structure. We improve the tree-based group key management scheme reducing both time and space complexities and we extend it to the case of intra- and inter-group secure communications. The key distribution process does not involve any semi-trusted third party and hence improves the robustness. Unlike existing techniques, our proposal fits very closely to the real-world scenarios where multiple groups exist in hierarchical order, for example in any organizations or institutes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Sahai, B. Waters, Fuzzy identity-based encryption. in Annual International Conference on the Theory and Applications of Cryptographic Techniques. (Springer, 2005), pp. 457–473

    Google Scholar 

  2. V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data. in Proceedings of the 13th ACM Conference on Computer and Communications Security. pp. 89–98. CCS ’06, (ACM, New York, NY, USA 2006). http://doi.acm.org/10.1145/1180405.1180418

  3. A. Shamir, How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  4. H. Kim, R.B. Chitti, J. Song, Novel defense mechanism against data flooding attacks in wireless ad hoc networks. IEEE Trans. Consum. Electron. 56(2), 579–582 (2010)

    Article  Google Scholar 

  5. J. Xiong, X. Liu, Z. Yao, J. Ma, Q. Li, K. Geng, P.S. Chen, A secure data self-destructing scheme in cloud computing. IEEE Trans. Cloud Comput. 2(4), 448–458 (2014)

    Article  Google Scholar 

  6. V. Goyal, R. Tripathy, An efficient solution to the arp cache poisoning problem. in Australasian Conference on Information Security and Privacy. (Springer 2005), pp. 40–51

    Google Scholar 

  7. Y. Kim, A. Perrig, G. Tsudik, Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. TISSEC 7(1), 60–96 (2004)

    Article  Google Scholar 

  8. K. Xue, P. Hong, A dynamic secure group sharing framework in public cloud computing. IEEE Trans. Cloud Comput. 2(4), 459–470 (2014)

    Article  Google Scholar 

  9. D.G. Steer, L. Strawczynski, W. Diffie, M. Wiener, A secure audio teleconference system. in Proceedings on Advances in cryptology. (Springer New York, Inc. 1990), pp. 520–528

    Google Scholar 

  10. R. Aparna, B.B. Amberker, Key management scheme for multiple simultaneous secure group communication. in 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA). pp. 1–6, Dec 2009

    Google Scholar 

  11. M.V. Tripunitara, P. Dutta, A middleware approach to asynchronous and backward compatible detection and prevention of arp cache poisoning. in Computer Security Applications Conference, 1999. (ACSAC’99) Proceedings. 15th Annual. pp. 303–309. IEEE (1999)

    Google Scholar 

  12. Y. Zhang, A. Juels, M.K. Reiter, T. Ristenpart, Cross-vm side channels and their use to extract private keys. in Proceedings of the 2012 ACM conference on Computer and communications security. (ACM, 2012), pp. 305–316

    Google Scholar 

  13. T. Ristenpart, E. Tromer, H. Shacham, S. Savage, Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. in Proceedings of the 16th ACM Conference on Computer and Communications Security. CCS ’09, (ACM, New York, NY, USA, 2009), pp. 199–212. http://doi.acm.org/10.1145/1653662.1653687

  14. L. Xu, X. Wu, X. Zhang, Cl-pre: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ASIACCS ’12, (ACM, New York, NY, USA, 2012), pp. 87–88. http://doi.acm.org/10.1145/2414456.2414507

  15. A.N. Khan, M.M. Kiah, S.A. Madani, M. Ali, S. Shamshirband et al., Incremental proxy re-encryption scheme for mobile cloud computing environment. J. Supercomput. 68(2), 624–651 (2014)

    Article  Google Scholar 

  16. J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption. in 2007 IEEE Symposium on Security and Privacy (SP ’07). pp. 321–334, May 2007

    Google Scholar 

  17. K.G. Paterson, E.A. Quaglia, Time-specific encryption. in International Conference on Security and Cryptography for Networks. (Springer 2010), pp. 1–16

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ditipriya Sinha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sinha, D., Datta, S., Das, A.K. (2020). Secure Data Sharing for Cloud-Based Services in Hierarchical Multi-group Scenario. In: Sahana, S., Bhattacharjee, V. (eds) Advances in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 988. Springer, Singapore. https://doi.org/10.1007/978-981-13-8222-2_19

Download citation

Publish with us

Policies and ethics