Abstract
In cloud computing data, outsourcing is one of the most convenient, cost–efficient, and cheapest ways for users to share their data with remote clients. However, the main problem is that the owner loses its physical control on data and so the main challenge is how to secure and share the data efficiently and maintaining fine-grained access control on it. Several approaches have been proposed including attribute-based encryption and proxy re-encryption for secured data sharing through cloud service providers. In this paper, we have given a survey and comparison of different attribute-based encryption and proxy re-encryption techniques. We have also proposed that threshold cyptosystem can be used for secured and efficient data sharing in cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53:50–58
Mell P, Grance T (2009) The NIST definition of cloud computing. Technical report, National Institute of Standards and Technology, Information Technology Laboratory, July 2009. http://www.csrc.nist.gov/groups/sns/cloud-computing/
Qian L, Luo Z, Du Y, Guo L (2009) Cloud computing: an overview. In: Proceedings of the 1st international conference on cloud computing, CLOUDCOM’09. Springer, Berlin, pp 626–631
Rimal B, Choi E, Lumb I (2009) A taxonomy and survey of cloud computing systems. In: IEEE fifth international joint conference on INC, IMS and IDC, pp 44 –51, Aug 2009
Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18
Hanna S. Cloud computing: finding the silver lining. http://www.ists.dartmouth.edu/events/abstract-hanna.html
Kantarcioglu M, Clifton C (2005) Security issues in querying encrypted data. In: Proceedings of the 19th annual working conference on data and applications security, DBSEC’05. Springer, Berlin, pp 325–337
Cantor S, Sigaba JM, Philpott R, Maler E (2005) Metadata for the OASIS security assertion markup language (SAML) v2.0”, copyright © OASIS open
Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J (2009) Controlling data in the cloud: Outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM workshop on cloud computing security (CCSW), pp 85–90
Dahbur K, Mohammad B, Tarakji AB (2011) Security issues in cloud computing: a survey of risks, threats and vulnerabilities. Int J Cloud Appl Comput (IJCAC) 1
Dhage SN, Meshram BB, Rawat R, Padawe S, Paingaokar M, Misra A (2011) Intrusion detection system in cloud computing environment. In: Proceedings of the international conference & workshop on emerging trends in technology, ICWET’11, pp 235–239
Kandukuri B, Paturi V, Rakshit A (2009) Cloud security issues. In: IEEE International conference on services computing, pp 517–520
Singh G, Sharma A, Lehal MS (2011) Security apprehensions in different regions of cloud captious grounds. Int J Network Secur Its Appl (IJNSA) 3
Brodkin J. Gartner: seven cloud-computing security risks. http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853
Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third—party compute clouds. In: Proceedings of the 16th ACM conference on computer and communications security, CCS’09. ACM, New York, pp 199–212
Wang C, Wang Q, Ren K, Lou W (2009) Ensuring data storage security in cloud computing. In: International workshop on quality of service, pp 1 –9, July 2009
Salesforce.com. warns customers of phishing scam. http://www.pcworld.com/article/139353/article.html
Yan L, Rong C, Zhao G (2009) Strengthen cloud computing security with federal identity management using ierarchical identity-based cryptography. In: Proceedings of the 1st international conference on cloud computing, CLOUDCOM’09. Springer, Berlin, pp 167–177
Lu R, Lin X, Liang X, Shen XS (2010) Secure provenance: the essential of bread and butter of data forensics in cloud computing. In: Proceedings of the 5th ACM symposium on information, computer and communications security, ASIACCS’10. ACM, New York
Lin D, Squicciarini A (2010) Data protection models for service provisioning in the cloud. In: Proceeding of the 15th ACM symposium on access control models and technologies, SACMAT’10, pp 183–192
Nyre AA, Jaatun M (2009) Privacy in a semantic cloud: whats trust got to do with it? In: Cloud computing, volume 5931 of lecture notes in computer science. Springer, Berlin, pp 107–118
Pearson S, Shen Y, Mowbray M (2009) A privacy manager for cloud computing. In: Proceedings of the 1st international conference on cloud computing, CLOUDCOM’09. Springer, Berlin, pp 90–106
Thuraisingham B, Khadilkar V, Gupta A, Kantarcioglu M, Khan L (2010) Secure data storage and retrieval in the cloud. In: Collaborative computing: networking, applications and worksharing (collaboratecom), pp 1–8, Oct 2010
Uemura T, Dohi T, Kaio N (2009) Availability analysis of a scalable intrusion tolerant architecture with two detection modes. In: Proceedings of the 1st international conference on cloud computing, CLOUDCOM’09. Springer, Berlin, pp 178–189
A. S. A. event. July 20, 2008. http://status.aws.amazon.com/s3-0080720.html
Takabi H, Joshi J, Ahn G (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Privacy 8(6):24–31
Jansen W, Grance T (2011) Draft special publication 800-144: guidelines on security and privacy in public cloud computing. National Institute of Standards and Technology, U.S. Department of Commerce
Andrei T (2009) Cloud computing challenges and related security issues
Agudo I, Nuez D, Giammatteo G, Rizomiliotis P, Lambrinoudakis C (2011) Cryptography goes to the cloud. in secure and trust computing, data management, and applications, vol 187 of communications in computer and information science. Springer, Berlin, pp 190–197
Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. In: Proceedings of the 2009 conference on hot topics in cloud computing, HOTCLOUD’09, Berkeley, CA, USA. Usenix Association
Bethencourt J, Sahai A, Waters B (2007 )Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE symposium on security and privacy
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT 2005. Springer, Berlin, pp 457–473
Goyal V, Pandy O, Sahai A, Waters B (2006) Attribute based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM computer and communications security conference, CCS’06
Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceeding of ACM conference on computer and communications security, pp 195–203
Tang Q, Ji D (2010) Verifiable attribute-based encryption. Int J Network Secur 10(2):114–120
Müller S, Katzenbeisser S, Eckert C (2009) Distributed attribute-based encryption. In: Proceedings of 11th international conference on information security and cryptology (ICISC 08), pp 20–36
Boneh D, Franklin MK (2003) Identity-based encryption from the weil pairing. SIAM J Comput 32(3):586–615
Boneh D, Boyen X, Goh E-J (2005) Hierarchical identity based encryption with constant size ciphertext. In: Cramer R (ed) Eurocrypt, volume 3494 of lecture notes in computer science. Springer, Berlin, pp 440–456
Wang G, Liu Q, Wu J (2010) Hierarhical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of ACM conference on computer and communications security, CCS’ 10
Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754
Tang Q (2008) Type-based proxy re-encryption and its construction. In: Proceedings of ninth international conference on cryptology in India, pp 130–144
Ateniese G, Benson K, Hohenberger S (2009) Key-private proxy re-encryption. In: Proceedings topics in cryptology, pp 279–294
Shamir A (1984) Identity-based cryptosystems and signatures schemes. Adv Cryptol 47–53
Libert B, Vergnaud D (2008) Tracing malicious proxies in proxy re-encryption. In: Proceedings of PAIRING’08. LNCS 5209. Springer, Berlin, pp 332–353
Liu Q, Wang G, Wu J (2012) Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Information sciences (in press)
Asharov G, Jain A, Lopez-Alt A, Tromer E, Vaikuntanathan V, Wichs D (2012) Multiparty computation with low communication, computation and interaction via threshold FHE. In: Proceeding of eurocrypt’12. Springer, Berlin, pp 483–501
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE international conference on computer communications, INFOCOM’10
Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Proceedings of advances in cryptology, eurocrypt’98
Yang Y, Zhang Y (2011) A generic scheme for secure data sharing in cloud. In: 40th international conference on parallel processing workshops, pp 145–153, Sept 2011
Samanthula BK et al (2015) A secure data sharing and query processing framework via federation of cloud computing. Inf Syst 48:196–212
Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the 4th conference on theory of cryptography, TCC’07. Springer, Berlin, pp 535–554
Hakan H, Iyer B, Li C, Mehrotra S (2002) Executing Sql over encrypted data in the database-service provider model. In: Proceedings of the 2002 ACM sigmod international conference on management of data, SIGMOD’02. ACM, pp 216–227
Hore B, Mehrotra S, Canim M, Kantarcioglu M (2012) Secure multidimensional range queries over outsourced data. VLDB J 21(3):333–358
Wang S, Agrawal D, El Abbadi A (2011) A comprehensive framework for secure query processing on relational data in the cloud. In: Proceedings of the 8th VLDB international conference on secure data management, SDM’11. Springer, Berlin, pp 52–69
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Agarwal, N., Rana, A., Pandey, J.P. (2018). Fine-Grained Access Control and Secured Data Sharing in Cloud Computing. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_20
Download citation
DOI: https://doi.org/10.1007/978-981-10-8536-9_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8535-2
Online ISBN: 978-981-10-8536-9
eBook Packages: EngineeringEngineering (R0)