Efficient and secure big data storage system with leakage resilience in cloud computing
With recent advancements in wireless smart terminal manufacture and communication technologies, a huge amount of data are generated from a variety of sources including software applications and hardware devices. To make the most of big data, cloud computing can be exploited to store, share, and process the data. However, data privacy issues are still significantly challenging in practice where users’ secrets may be leaked because of diverse software vulnerabilities and hardware attacks. In this paper, to address the above security challenge of big data, we propose an efficient and secure big data storage system in cloud computing, in which a leakage-resilient encryption scheme serves as the main ingredient. What’s more, our formal security proofs analysis indicates that the proposed scheme can ensure users’ data privacy even if the partial key is leaked in cloud computing. Finally, the leakage resilience analysis indicates that the leakage ratio in our scheme can reach roughly 1/3 and is higher than other schemes. Performance comparisons show the practicability of our scheme for big data security in cloud computing.
KeywordsCloud computing Big data Leakage resilience Data security
We are grateful to the anonymous referees for their invaluable suggestions. This work is supported by National Key R&D Program of China (Nos. 2017YFB0802000), National Natural Science Foundation of China (Nos. 61772418, 61472472, 61402366), Natural Science Basic Research Plan in Shaanxi Province of China (Nos. 2018JZ6001 and 2015JQ6236). Yinghui Zhang is supported by New Star Team of Xi’an University of Posts and Telecommunications (2016-02).
Compliance with ethical standards
Conflict of interest
The authors declare that they have no conflict of interest.
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent was obtained from all individual participants included in the study.
- Akavia A, Goldwasser S, Vaikuntanathan V (2009) Simultaneous hardcore bits and cryptography against memory attacks. In: Theory of cryptography conference, pp 474–495Google Scholar
- Alwen J, Dodis Y, Wichs D (2009) Leakage-resilient public-key cryptography in the bounded-retrieval model. In: International cryptology conference on advances in cryptology, pp 36–54Google Scholar
- Berti F, Pereira O, Peters T, Standaert FX (2017) On leakage-resilient authenticated encryption with decryption leakages. IACR Trans Symmetric Cryptol 2017(3):271–293Google Scholar
- Brakerski Z, Kalai Y, Katz J, Vaikuntanathan V (2010) Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: IEEE symposium on foundations of computer science, pp 501–510Google Scholar
- Dodis Y, Haralambiev K, Lopez-Alt A, Wichs D (2010) Cryptography against continuous memory attacks. In: Foundations of computer science, pp 511–520Google Scholar
- Dodis Y, Lewko A, Waters B, Wichs D (2011) Storing secrets on continually leaky devices. In: Foundations of computer science, pp 688–697Google Scholar
- Dziembowski S, Pietrzak K (2008) Leakage-resilient cryptography. In: IEEE symposium on foundations of computer science, pp. 293–302Google Scholar
- Goldwasser S, Rothblum GN (2010) Securing computation against continuous leakage. In: Conference on advances in cryptology, pp 59–79Google Scholar
- Naor M, Segev G (2009) Public-key cryptosystems resilient to key leakage. In: International cryptology conference on advances in cryptology, pp 18–35Google Scholar
- Simmons P (2011) Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In: Proceedings of the 27th annual computer security applications conference, ACM, pp 73–82Google Scholar
- Taneja R, Gaur D (2018) Robust fuzzy neuro system for big data analytics. Dev Biol 85(2):344–357Google Scholar
- Wu J, Ping L, Ge X, Wang Y, Fu J (2010) Cloud storage as the infrastructure of cloud computing. In: 2010 international conference on intelligent computing and cognitive informatics (ICICCI), IEEE, pp 380–383Google Scholar
- Zhang X, Chen X, Wang J, Zhan Z, Li J (2018a) Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing. Soft Comput 1–14. https://doi.org/10.1007/s00500-018-3233-7
- Zhang Y, Zheng D, Rui G, Qinglan Z (2018e) Fine-grained access control systems suitable for resource-constrained users in cloud computing. Comput Inf 37(2):327–348Google Scholar