Abstract
This paper proposes a cloud-based framework to enable secure data sharing among multiple groups of people organized in a hierarchy. The framework supports restrictive communication scenarios where one can define a communication policy by specifying “who can communicate to whom,” in order to respect the hierarchical structure. We improve the tree-based group key management scheme reducing both time and space complexities and we extend it to the case of intra- and inter-group secure communications. The key distribution process does not involve any semi-trusted third party and hence improves the robustness. Unlike existing techniques, our proposal fits very closely to the real-world scenarios where multiple groups exist in hierarchical order, for example in any organizations or institutes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Sahai, B. Waters, Fuzzy identity-based encryption. in Annual International Conference on the Theory and Applications of Cryptographic Techniques. (Springer, 2005), pp. 457–473
V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data. in Proceedings of the 13th ACM Conference on Computer and Communications Security. pp. 89–98. CCS ’06, (ACM, New York, NY, USA 2006). http://doi.acm.org/10.1145/1180405.1180418
A. Shamir, How to share a secret. Commun. ACM 22(11), 612–613 (1979)
H. Kim, R.B. Chitti, J. Song, Novel defense mechanism against data flooding attacks in wireless ad hoc networks. IEEE Trans. Consum. Electron. 56(2), 579–582 (2010)
J. Xiong, X. Liu, Z. Yao, J. Ma, Q. Li, K. Geng, P.S. Chen, A secure data self-destructing scheme in cloud computing. IEEE Trans. Cloud Comput. 2(4), 448–458 (2014)
V. Goyal, R. Tripathy, An efficient solution to the arp cache poisoning problem. in Australasian Conference on Information Security and Privacy. (Springer 2005), pp. 40–51
Y. Kim, A. Perrig, G. Tsudik, Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. TISSEC 7(1), 60–96 (2004)
K. Xue, P. Hong, A dynamic secure group sharing framework in public cloud computing. IEEE Trans. Cloud Comput. 2(4), 459–470 (2014)
D.G. Steer, L. Strawczynski, W. Diffie, M. Wiener, A secure audio teleconference system. in Proceedings on Advances in cryptology. (Springer New York, Inc. 1990), pp. 520–528
R. Aparna, B.B. Amberker, Key management scheme for multiple simultaneous secure group communication. in 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA). pp. 1–6, Dec 2009
M.V. Tripunitara, P. Dutta, A middleware approach to asynchronous and backward compatible detection and prevention of arp cache poisoning. in Computer Security Applications Conference, 1999. (ACSAC’99) Proceedings. 15th Annual. pp. 303–309. IEEE (1999)
Y. Zhang, A. Juels, M.K. Reiter, T. Ristenpart, Cross-vm side channels and their use to extract private keys. in Proceedings of the 2012 ACM conference on Computer and communications security. (ACM, 2012), pp. 305–316
T. Ristenpart, E. Tromer, H. Shacham, S. Savage, Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. in Proceedings of the 16th ACM Conference on Computer and Communications Security. CCS ’09, (ACM, New York, NY, USA, 2009), pp. 199–212. http://doi.acm.org/10.1145/1653662.1653687
L. Xu, X. Wu, X. Zhang, Cl-pre: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ASIACCS ’12, (ACM, New York, NY, USA, 2012), pp. 87–88. http://doi.acm.org/10.1145/2414456.2414507
A.N. Khan, M.M. Kiah, S.A. Madani, M. Ali, S. Shamshirband et al., Incremental proxy re-encryption scheme for mobile cloud computing environment. J. Supercomput. 68(2), 624–651 (2014)
J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption. in 2007 IEEE Symposium on Security and Privacy (SP ’07). pp. 321–334, May 2007
K.G. Paterson, E.A. Quaglia, Time-specific encryption. in International Conference on Security and Cryptography for Networks. (Springer 2010), pp. 1–16
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sinha, D., Datta, S., Das, A.K. (2020). Secure Data Sharing for Cloud-Based Services in Hierarchical Multi-group Scenario. In: Sahana, S., Bhattacharjee, V. (eds) Advances in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 988. Springer, Singapore. https://doi.org/10.1007/978-981-13-8222-2_19
Download citation
DOI: https://doi.org/10.1007/978-981-13-8222-2_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8221-5
Online ISBN: 978-981-13-8222-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)