Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System
Title | Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Wu, Y., Lyu, Y., Fang, Q., Zheng, G., Yin, H., Shi, Y. |
Conference Name | 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW) |
ISBN Number | 978-1-5386-3292-5 |
Keywords | Access Control, attribute based encryption, authorisation, cloud computing, composability, cryptography, cyber physical systems, data confidentiality, data outsourcing, data protection, decryption keys, Encryption, HAC-DMS, hierarchical access control, hierarchical system, Memory, organisational aspects, outsourced data protection, outsourcing, privacy data management system, pubcrawl, Resiliency, scalable data sharing services, scalable data storage services, Security Goal, Semi-trustworthy storage, semitrustworthy cloud, SSP, storage service providers, third-party services, Trustworthy Systems, usability goal |
Abstract | Data outsourcing in cloud is emerging as a successful paradigm that benefits organizations and enterprises with high-performance, low-cost, scalable data storage and sharing services. However, this paradigm also brings forth new challenges for data confidentiality because the outsourced are not under the physic control of the data owners. The existing schemes to achieve the security and usability goal usually apply encryption to the data before outsourcing them to the storage service providers (SSP), and disclose the decryption keys only to authorized user. They cannot ensure the security of data while operating data in cloud where the third-party services are usually semi-trustworthy, and need lots of time to deal with the data. We construct a privacy data management system appending hierarchical access control called HAC-DMS, which can not only assure security but also save plenty of time when updating data in cloud. |
URL | http://ieeexplore.ieee.org/document/7979835/ |
DOI | 10.1109/ICDCSW.2017.19 |
Citation Key | wu_protecting_2017 |
- organisational aspects
- usability goal
- Trustworthy Systems
- third-party services
- storage service providers
- SSP
- semitrustworthy cloud
- Semi-trustworthy storage
- Security Goal
- scalable data storage services
- scalable data sharing services
- Resiliency
- pubcrawl
- privacy data management system
- outsourcing
- outsourced data protection
- Access Control
- Memory
- hierarchical system
- hierarchical access control
- HAC-DMS
- encryption
- decryption keys
- Data protection
- data outsourcing
- data confidentiality
- cyber physical systems
- Cryptography
- composability
- Cloud Computing
- authorisation
- attribute based encryption