access icon free A User-Centric Data Secure Creation Scheme in Cloud Computing

Due to the use of the cloud computing technology, the ownership is separated from the administration of the data in cloud and the shared data might be migrated between different clouds, which would bring new challenges to data secure creation, especially for the data privacy protection. We propose a User-centric data secure creation scheme (UCDSC) for the security requirements of resource owners in cloud. In this scheme, a data owner first divides the users into different domains. The data owner encrypts data and defines different secure managing policies for the data according to domains. To encrypt the data in UCDSC, we present an algorithm based on Access control conditions proxy re-encryption (ACC-PRE), which is proved to be master secret secure and Chosen-ciphertext attack (CCA) secure in random oracle model. We give the application protocols and make the comparisons between some existing approaches and UCDSC.

Inspec keywords: cloud computing; data protection; authorisation; cryptographic protocols

Other keywords: master secret secure attack; application protocols; cloud computing; random oracle model; chosen-ciphertext attack; security requirements; data privacy protection; data encryption; access control conditions proxy re-encryption; user-centric data secure creation scheme; UCDSC; CCA

Subjects: Internet software; Data security

http://iet.metastore.ingenta.com/content/journals/10.1049/cje.2016.07.017
Loading

Related content

content/journals/10.1049/cje.2016.07.017
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading