Efficient and secure big data storage system with leakage resilience in cloud computing

  • Yinghui Zhang
  • Menglei Yang
  • Dong Zheng
  • Pengzhen Lang
  • Axin Wu
  • Chen Chen


With recent advancements in wireless smart terminal manufacture and communication technologies, a huge amount of data are generated from a variety of sources including software applications and hardware devices. To make the most of big data, cloud computing can be exploited to store, share, and process the data. However, data privacy issues are still significantly challenging in practice where users’ secrets may be leaked because of diverse software vulnerabilities and hardware attacks. In this paper, to address the above security challenge of big data, we propose an efficient and secure big data storage system in cloud computing, in which a leakage-resilient encryption scheme serves as the main ingredient. What’s more, our formal security proofs analysis indicates that the proposed scheme can ensure users’ data privacy even if the partial key is leaked in cloud computing. Finally, the leakage resilience analysis indicates that the leakage ratio in our scheme can reach roughly 1/3 and is higher than other schemes. Performance comparisons show the practicability of our scheme for big data security in cloud computing.


Cloud computing Big data Leakage resilience Data security 



We are grateful to the anonymous referees for their invaluable suggestions. This work is supported by National Key R&D Program of China (Nos. 2017YFB0802000), National Natural Science Foundation of China (Nos. 61772418, 61472472, 61402366), Natural Science Basic Research Plan in Shaanxi Province of China (Nos. 2018JZ6001 and 2015JQ6236). Yinghui Zhang is supported by New Star Team of Xi’an University of Posts and Telecommunications (2016-02).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.


  1. Akavia A, Goldwasser S, Vaikuntanathan V (2009) Simultaneous hardcore bits and cryptography against memory attacks. In: Theory of cryptography conference, pp 474–495Google Scholar
  2. Alwen J, Dodis Y, Wichs D (2009) Leakage-resilient public-key cryptography in the bounded-retrieval model. In: International cryptology conference on advances in cryptology, pp 36–54Google Scholar
  3. Berti F, Pereira O, Peters T, Standaert FX (2017) On leakage-resilient authenticated encryption with decryption leakages. IACR Trans Symmetric Cryptol 2017(3):271–293Google Scholar
  4. Brakerski Z, Kalai Y, Katz J, Vaikuntanathan V (2010) Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: IEEE symposium on foundations of computer science, pp 501–510Google Scholar
  5. Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195MathSciNetCrossRefzbMATHGoogle Scholar
  6. Dodis Y, Haralambiev K, Lopez-Alt A, Wichs D (2010) Cryptography against continuous memory attacks. In: Foundations of computer science, pp 511–520Google Scholar
  7. Dodis Y, Lewko A, Waters B, Wichs D (2011) Storing secrets on continually leaky devices. In: Foundations of computer science, pp 688–697Google Scholar
  8. Dziembowski S, Pietrzak K (2008) Leakage-resilient cryptography. In: IEEE symposium on foundations of computer science, pp. 293–302Google Scholar
  9. Gandolfi K, Mourtel C, Olivier F (2001) Electromagnetic analysis: concrete results. Lecture Notes Comput Sci 2162:251–261CrossRefzbMATHGoogle Scholar
  10. Gao Cz, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack. Inf Sci 444:72–88MathSciNetCrossRefGoogle Scholar
  11. Goldwasser S, Rothblum GN (2010) Securing computation against continuous leakage. In: Conference on advances in cryptology, pp 59–79Google Scholar
  12. Gupta BB (2015) Editorial (thematic issue: cyber security, privacy and forensics for complex systems). Int J Sens Wirel Commun Control 5(1):2MathSciNetCrossRefGoogle Scholar
  13. Gupta S, Gupta BB (2016) An infrastructure-based framework for the alleviation of javascript worms from osn in mobile cloud platforms. In: International conference on network and system security, Springer, pp 98–109Google Scholar
  14. Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global. Google Scholar
  15. Gupta B, Yamaguchi S, Agrawal DP (2018) Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimed Tools Appl 77(7):9203–9208CrossRefGoogle Scholar
  16. Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412:223–241CrossRefGoogle Scholar
  17. Kurosawa K (2017) Anonymous and leakage resilient ibe and ipe. Des Codes Cryptogr 85(2):273–298MathSciNetCrossRefzbMATHGoogle Scholar
  18. Li S, Zhang F (2013) Leakage-resilient identity-based encryption scheme. Int J Grid Utility Comput 4(2/3):187–196CrossRefGoogle Scholar
  19. Li J, Chen X, Huang X, Tang S, Xiang Y, Hassan MM, Alelaiwi A (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579MathSciNetCrossRefzbMATHGoogle Scholar
  20. Li J, Teng M, Zhang Y, Yu Q (2016) A leakage-resilient cca-secure identity-based encryption scheme. Comput J 59(7):1066–1075MathSciNetCrossRefGoogle Scholar
  21. Li J, Yu Q, Zhang Y (2017) Identity-based broadcast encryption with continuous leakage resilience. Inf Sci 429:177–193MathSciNetCrossRefGoogle Scholar
  22. Li J, Chen X, Chow SS, Huang Q, Wong DS, Liu Z (2018a) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96CrossRefGoogle Scholar
  23. Li J, Zhang Y, Chen X, Xiang Y (2018b) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12CrossRefGoogle Scholar
  24. Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018c) Privacy-preserving machine learning with multiple data providers. Future Gener Comput Syst 87:341–350CrossRefGoogle Scholar
  25. Li T, Li J, Liu Z, Li P, Jia C (2018d) Differentially private naive bayes learning over multiple data sources. Inf Sci 444:89–104MathSciNetCrossRefGoogle Scholar
  26. Lin Q, Li J, Huang Z, Chen W, Shen J (2018a) A short linearly homomorphic proxy signature scheme. IEEE Access 6:12966–12972CrossRefGoogle Scholar
  27. Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018b) An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRefGoogle Scholar
  28. Liu Z, Huang Y, Li J, Cheng X, Shen C (2018) Divoram: towards a practical oblivious ram with variable block size. Inf Sci 447:1–11CrossRefGoogle Scholar
  29. Naor M, Segev G (2009) Public-key cryptosystems resilient to key leakage. In: International cryptology conference on advances in cryptology, pp 18–35Google Scholar
  30. Psannis K, Stergiou C, Gupta BB (2018) Advanced media-based smart big data on intelligent cloud systems. IEEE Trans Sustain Comput. Google Scholar
  31. Ruan O, Zhang Y, Zhang M, Zhou J, Harn L (2018) After-the-fact leakage-resilient identity-based authenticated key exchange. IEEE Syst J 12(2):2017–2026CrossRefGoogle Scholar
  32. Shen J, Wang C, Li T, Chen X, Huang X, Zhan ZH (2018) Secure data uploading scheme for a smart home system. Inf Sci 453:186–197CrossRefGoogle Scholar
  33. Simmons P (2011) Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In: Proceedings of the 27th annual computer security applications conference, ACM, pp 73–82Google Scholar
  34. Sun SF, Gu D, Liu S (2016) Efficient chosen ciphertext secure identity-based encryption against key leakage attacks. Secur Commun Netw 9(11):1417–1434CrossRefGoogle Scholar
  35. Taneja R, Gaur D (2018) Robust fuzzy neuro system for big data analytics. Dev Biol 85(2):344–357Google Scholar
  36. Wu J, Ping L, Ge X, Wang Y, Fu J (2010) Cloud storage as the infrastructure of cloud computing. In: 2010 international conference on intelligent computing and cognitive informatics (ICICCI), IEEE, pp 380–383Google Scholar
  37. Wu A, Zheng D, Zhang Y, Yang M (2018) Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing. Sensors (Basel, Switzerland) 18(7):1–17. Google Scholar
  38. Xie R, He C, Xie D, Gao C, Zhang X (2018) A secure ciphertext retrieval scheme against insider kgas for mobile devices in cloud storage. Secur Commun Netw 2018(3):1–7CrossRefGoogle Scholar
  39. Ye H, Liu J, Wang W, Li P, Li T, Li J (2018) Secure and efficient outsourcing differential privacy data release scheme in cyber-physical system. Future Gener Comput Syst. Google Scholar
  40. Yu Z, Au MH, Xu Q, Yang R, Han J (2018) Towards leakage-resilient fine-grained access control in fog computing. Future Gener Comput Syst 78:763–777CrossRefGoogle Scholar
  41. Zhang Y, Chen X, Li H, Cao J (2012) Identity-based construction for secure and efficient handoff authentication schemes in wireless networks. Secur Commun Netw 5(10):1121–1130CrossRefGoogle Scholar
  42. Zhang Y, Li J, Chen X, Li H (2016a) Anonymous attribute-based proxy re-encryption for access control in cloud computing. Secur Commun Netw 9(14):2397–2411CrossRefGoogle Scholar
  43. Zhang Y, Zheng D, Chen X, Li J, Li H (2016b) Efficient attribute-based data sharing in mobile clouds. Pervasive Mob Comput 28:135–149CrossRefGoogle Scholar
  44. Zhang Y, Zheng D, Li Q, Li J, Li H (2016c) Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Secur Commun Netw 9(16):3688–3702CrossRefGoogle Scholar
  45. Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017a) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61CrossRefGoogle Scholar
  46. Zhang Y, Li J, Zheng D, Chen X, Li H (2017b) Towards privacy protection and malicious behavior traceability in smart health. Personal Ubiquitous Comput 21(5):815–830CrossRefGoogle Scholar
  47. Zhang Y, Wu A, Zheng D (2017c) Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. J Ambient Intell Humaniz Comput 21:1–10. Google Scholar
  48. Zhang X, Chen X, Wang J, Zhan Z, Li J (2018a) Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing. Soft Comput 1–14.
  49. Zhang Y, Deng RH, Liu X, Zheng D (2018b) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277CrossRefGoogle Scholar
  50. Zhang Y, Deng RH, Shu J, Yang K, Zheng D (2018c) Tkse: trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6:31077–31087CrossRefGoogle Scholar
  51. Zhang Y, Zheng D, Deng RH (2018d) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet of Things J 5(3):2130–2145CrossRefGoogle Scholar
  52. Zhang Y, Zheng D, Rui G, Qinglan Z (2018e) Fine-grained access control systems suitable for resource-constrained users in cloud computing. Comput Inf 37(2):327–348Google Scholar
  53. Zheng D, Wu A, Zhang Y, Zhao Q (2018) Efficient and privacy-preserving medical data sharing in internet of things with limited computing power. IEEE Access 6:28019–28027CrossRefGoogle Scholar
  54. Zhou Y, Yang B (2017) Continuous leakage-resilient public-key encryption scheme with cca security. Comput J 60(8):1161–1172MathSciNetCrossRefGoogle Scholar
  55. Zhou Y, Yang B, Mu Y (2018) Continuous leakage-resilient identity-based encryption without random oracles. Comput J 61(4):586–600MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.National Engineering Laboratory for Wireless SecurityXi’an University of Posts and TelecommunicationsXi’anChina
  2. 2.Westone Cryptologic Research CenterBeijingChina

Personalised recommendations