SDS2: Secure Data-Sharing Scheme for Crowd Owners in Public Cloud Service

Author(s):  
You Zhou ◽  
Liang-Min Wang
Author(s):  
Jingwen Pan ◽  
Jie Cui ◽  
Lu Wei ◽  
Yan Xu ◽  
Hong Zhong

Sensors ◽  
2018 ◽  
Vol 19 (1) ◽  
pp. 114 ◽  
Author(s):  
Dong Chen ◽  
Wei Lu ◽  
Weiwei Xing ◽  
Na Wang

With the wide application of wireless sensor networks (WSNs), secure data sharing in networks is becoming a hot research topic and attracting more and more attention. A huge challenge is securely transmitting the data from the source node to the sink node. Except for eavesdropping the information stored in the packages, the adversary may also attempt to analyze the contextual information of the network to locate the source node. In this paper, we proposed a secure data sharing approach to defend against the adversary. Specifically, we first design a secret key mechanism to guarantee the security of package delivery between a pair of nodes. Then, a light-weighted secret sharing scheme is designed to map the original message to a set of shares. Finally, the shares are delivered to the sink node independently based on a proper random routing algorithm. Simulation results illustrate that our approach can defend against the eavesdropping and tracing-back attack in an energy-efficient manner.


2019 ◽  
Vol 95 ◽  
pp. 560-569 ◽  
Author(s):  
Pandi Vijayakumar ◽  
S. Milton Ganesh ◽  
Lazarus Jegatha Deborah ◽  
SK Hafizul Islam ◽  
Mohammad Mehedi Hassan ◽  
...  

2018 ◽  
Vol 6 (2) ◽  
pp. 344-357 ◽  
Author(s):  
Ruixuan Li ◽  
Chenglin Shen ◽  
Heng He ◽  
Xiwu Gu ◽  
Zhiyong Xu ◽  
...  

Nowadays cloud is being used by both individuals and organizations to store and share the data without establishing their own data center. The outsourcings of these data are becoming a major security issue for businesses. Searchable encryption is one of the prominent techniques which allow the data owner to securely store the data and then share the data for their growth in business. With this technique, Cloud Service Provider can process the user request by searching on encrypted stored data without decrypting the data. In this paper we analyze different searchable encryption techniques for secure data sharing and their preventive attacks. We also proposed a method named “User Prediction in Role” to reduce the insider attack possibility in Role Based Data Sharing (RBDS), which is based on user p


Author(s):  
Xiuqing Lu ◽  
Zhenkuan Pan ◽  
Hequn Xian

Abstract With the development of big data and cloud computing, more and more enterprises prefer to store their data in cloud and share the data among their authorized employees efficiently and securely. So far, many different data sharing schemes in different fields have been proposed. However, sharing sensitive data in cloud still faces some challenges such as achieving data privacy and lightweight operations at resource constrained mobile terminals. Furthermore, most data sharing schemes have no integrity verification mechanism, which would result in wrong computation results for users. To solve the problems, we propose an efficient and secure data sharing scheme for mobile devices in cloud computing. Firstly, the scheme guarantees security and authorized access of shared sensitive data. Secondly, the scheme realizes efficient integrity verification before users share the data to avoid incorrect computation. Finally, the scheme achieves lightweight operations of mobile terminals on both data owner and data requester sides.


2016 ◽  
Vol 62 ◽  
pp. 193-212 ◽  
Author(s):  
Rui Jiang ◽  
Xianglong Wu ◽  
Bharat Bhargava

Sign in / Sign up

Export Citation Format

Share Document