A New User-controlled and Efficient Encrypted Data Sharing Model in Cloud Storage

2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.

2014 ◽  
Vol 687-691 ◽  
pp. 2913-2916
Author(s):  
Xiao Kun

For the data security threats caused by out sourcing model and shared vulnerability, and base on user data in static characteristics of cloud storage services and the dynamic nature of cloud computing, it requires to propose corresponding data security protection mechanisms, in addition, in order to make the mechanism work normally, we propose a program which can be trusted and can be garnered and user can test, offer the recoverability of data and the integrity verification of data and the accountability leak of data.


TEKNOKOM ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 1-6
Author(s):  
Indra Surya Permana ◽  
Taufik Hidayat ◽  
Rahutomo Mahardiko

The development of information technology has grown exponentially and various of data collections and its method has been obtained. In the era of big data, data has now become an asset that held important values, while in the implementation of data delivery, it clearly is not always safe. One of the method to secure data delivery is data encryption using Cryptography. Cryptography provides an encryption service to secure data delivery by transforming it to random values so that it can no longer be read. The goal in this study was to produce an application that could be used to encrypt data, using ElGamal's cryptography method and hash checking using the SHA256 algorithm. After encryption, to ensure the encrypted data is still the original data without any changes or manipulation by unauthorized 3rd party then done by checking the hash generated using SHA256 algorithm. The data used in this study was a sample of raw data from the ATPWTP survey (ability to pay and willing to pay) conducted by the BPS Cirebon (Central Statistics) in 2019 and the data was in the form of Excel and txt files. The encryption process resulted in a cipher larger than the plaintext and takes longer for the data encryption process than during the data cipher decryption process.


Distributed Cloud Environment (DCE) focuses mainly on securing the data and safely shares it to the user. Data leakage may occur by the channel compromising or with the key managers. It is necessary to safeguard the communication channel between the entities before sharing the data. In this process of sharing, what if the key managers compromises with intruders and reveal the information of the user’s key that is used for encryption. The process of securing the key by using the user’s phrase is the key concept used in the proposed system “Secure Storing and Sharing of Data in Cloud Environment using User Phrase (S3DCE). It does not rely on any key managers to generate the key instead; the user himself generates the key. In order to provide double security, the public key derived from the user’s phrase also encrypts the encryption key. S3DCE guarantees privacy, confidentiality and integrity of the user data while storing and sharing. The proposed method S3DCE is more efficient in terms of time, cost and resource utilization compared to the existing algorithm DaSCE (Data Security for Cloud Environment with Semi Trusted Third Party) [22] and DACESM (Data Security for Cloud Environment with Scheduled Key Managers) [23].


JAMIA Open ◽  
2021 ◽  
Author(s):  
Ram D Gopal ◽  
Hooman Hidaji ◽  
Raymond A Patterson ◽  
Niam Yaraghi

Abstract Objectives To examine the impact of COVID-19 pandemic on the extent of potential violations of Internet users’ privacy. Materials and Methods We conducted a longitudinal study of the data sharing practices of the top 1,000 websites in the US between April 9th and August 27th, 2020. We fitted a conditional latent growth curve model on the data to examine the longitudinal trajectory of the third-party data sharing over the 21 weeks period of the study and examine how website characteristics affect this trajectory. We denote websites that asked for permission before placing cookies on users’ browsers as "privacy-respecting". Results As the weekly number of COVID-19 deaths increased by 1,000, the average number of third parties increased by 0.26 [95%CI, 0.15 to 0.37] P<.001 units in the next week. This effect was more pronounced for websites with higher traffic as they increased their third parties by an additional 0.41 [95% CI, 0.18 to 0.64]; P<.001 units per week. However, privacy respecting websites that experienced a surge in traffic reduced their third parties by 1.01 [95% CI, -2.01 to 0]; P = 0.05 units per week in response to every 1,000 COVID-19 deaths in the preceding week. Discussion While in general websites shared their users’ data with more third parties as COVID-19 progressed in the US, websites’ expected traffic and respect for users’ privacy significantly affect such trajectory. Conclusions Attention should also be paid to the impact of the pandemic on elevating online privacy threats, and the variation in third-party tracking among different types of websites. Lay Summary As the COVID-19 pandemic progressed in the country, the demand for online services surged. As the level of Internet use increased, websites’ opportunity to track and monetize users’ data increased with it. In this research, we examine the extent to which websites increased the number of third-parties with which they share their user’ data and how such practices were moderated by a website’s level of respect for users’ privacy and traffic surge. We find that while the number of third parties increased over time, the websites with higher respect for privacy tend to decrease the number of their parties only if they also experience a significant increase in their traffic.


Author(s):  
Shaveta Malik ◽  
Archana Mire ◽  
Amit Kumar Tyagi ◽  
Arathi Boyanapalli

Clinical research comprises participation from patients. Often there are concerns of enrolment from patients. Hence, it has to face various challenges related to personal data, such as data sharing, privacy and reproducibility, etc. Patients and researchers need to track a set plan called study protocol. This protocol spans through various stages such as registration, collection and analysis of data, report generation, and finally, results in publication of findings. The Blockchain technology has emerged as one of the possible solutions to these challenges. It has a potential to address all the problem associated with clinical research. It provides the comfort for building transparent, secure services relying on trusted third party. This technology enables one to share the control of the data, security, and the parameters with a single patient or a group of patients or any other stakeholders of clinical trial. This chapter addresses the use of blockchain in execution of secure and trusted clinical trials.


Hypertension ◽  
2020 ◽  
Vol 76 (Suppl_1) ◽  
Author(s):  
Khaled Abdelrahman ◽  
Josh Bilello ◽  
Megna Panchbhavi ◽  
Mohammed S Abdullah

Introduction: Diabetes mobile applications (apps) that help patients monitor disease have led to privacy concerns. We aimed to assess privacy policies for diabetes mobile applications with a focus on data transmission to outside parties. Methods: The App Store was used to gather apps pertaining to diabetes by searching “diabetes” and “blood sugar”. Two readers evaluated privacy policies (PP) including data sharing and storing techniques for mention of 27 predetermined criteria. All network traffic generated while loading and using the app was intercepted by a man-in-the-middle attack to listen to data delivered between the sender and receiver of data transmissions. A packet analyzer determined contents of transmission, where data was sent, and if transmission contained user data. Results: Of 35 apps evaluated, 29 (83%) had PP. The most frequent transmission destinations were Google (n=130 transmissions), Kamai Technologies (n=53), Facebook (n=38) and Amazon (n=33). 35 of 35 apps (100%) were transmitting data to a third party. 2 of 2 (100%) of those who had a privacy policy without mention of a third party transmitted data to a third party. 8 of 8 (100%) apps who mentioned they would not transmit to a third party were found to do so. 19 of 19 (100%) apps who mentioned they would transmit data to a third party were found to do so. All apps (n=6) without a privacy policy were found to be transmitting data to a third party. Conclusion: Most diabetes apps on the App store have accessible PP. All apps evaluated transmitted data to a third party, even when the policy stated this would not occur. As mobile applications are increasingly utilized by patients, it is important to warn of privacy implications.


2020 ◽  
Vol 17 (4) ◽  
pp. 1937-1942
Author(s):  
S. Sivasankari ◽  
V. Lavanya ◽  
G. Saranya ◽  
S. Lavanya

These days, Cloud storage is gaining importance among individual and institutional users. Individual and foundations looks for cloud server as a capacity medium to diminish their capacity load under nearby devices. In such storage services, it is necessary to avoid duplicate content/repetitive storage of same data to be avoided. By reducing the duplicate content in cloud storage reduces storage cost. De-duplication is necessary when multiple data owner outsource the same data, issues related to security and ownership to be considered. As the cloud server is always considered to be non trusted, as it is maintained by third party, thus the data stored in cloud is always encrypted and uploaded, thus randomization property of encryption affects de-duplication. It is necessary to propose a serverside de-duplication scheme for handling encrypted data. The proposed scheme allows the cloud server to control access to outsourced data even when the ownership changes dynamically.


Sign in / Sign up

Export Citation Format

Share Document