Data Sharing using Searchable and Auditable ABE with Sensitive Detail Masking Technique

Authors

  • Prof. R. V. Mante  Department of Computer Science and Engineering, Government College of Engineering, Amravati, Amravati, India
  • Nikhil R. Bajad  Department of Computer Science and Engineering, Government College of Engineering, Amravati, Amravati, India

Keywords:

Cloud storage, data sharing, sensitive information hiding, Attribute-based encryption, multi-keyword search, public auditability.

Abstract

In cloud storage services, data is being stored on the cloud by user and can be shared by others. Electronic health records system is one of the common system for cloud storage. The cloud file may include sensitive data, that data should not be revealed by others. Encrypting whole shared file may secure the data but makes that data unshared by other users. Users time and memory is saved by storing data in cloud, but once user stores data in cloud he loses control over his data. So the system is proposed having third party auditor for safe and easy use by the users. In this scheme, a sanitizer is used to sanitize the data blocks corresponding to the sensitive information of the ?le. Meanwhile, the proposed scheme is based on Attribute based Encryption, which simpli?es the complicated certi?cate management. The analysis and the performance evaluation show that the proposed scheme is secure and ef?cient.

References

  1. Wenting Shen, Jing Qin, Jia Yu , Rong Hao, and Jiankun Hu, “Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 2, february 2019
  2. G. Ateniese , “Provable data possession at untrusted stores,” in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 598–609.
  3. B. S. Kaliski, Jr. A. and Juels, “Pors: Proofs of retrievability for large files,” in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 584–597.
  4. Shangping Wang , Shasha Jia , And Yaling Zhang , “Verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage,” volume 7, 2019 received March 25, 2019, accepted April 9, 2019, date of publication April 12, 2019, date of current version April 25, 2019.Digital Object Identifier 10.1109/ACCESS.2019.2910828
  5. S. S. M. Chow, C. Wang,  K.  Ren, W. Lou, and Q. Wang,  “Privacy preserving public auditing for secure cloud storage,” IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375, Feb. 2013.
  6. C. Xu, S. G. Worku , X. He, and J. Zhao, “Secure and efficient privacy preserving public auditing scheme for cloud storage,” Comput. Electr. Eng., vol. 40, no. 5, pp. 1703–1713, 2014.
  7. J. Yu, H. Xia, X. Lu, W. Shen, R. Hao and H. Zhang, “Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium,” J. Netw. Comput. Appl., vol. 82, pp. 56–64, Mar. 2017.
  8. K. Ren, C. Guan, F. Zhang, J. Yu, and F. Kerschbaum, “Symmetric key based proofs of retrievability supporting public verification,” in Computer Security—ESORICS. Cham, Switzerland: Springer, 2015, pp. 203–223.
  9. D. Wang, Y. Luo, S. Fu, J. Deng and M. Xu, “Efficient integrity auditing for shared data in the cloud with secure user revocation,” in Proc. IEEE Trustcom/BigDataSE/ISPA, Aug. 2015, pp. 434–442.
  10. C. Wang, Q. Wang, K. Ren, J. Li and W. Lou, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no.5, pp. 847–859, May 2011.
  11. A. Kupcu, C. Erway, R. Tamassia, and C. Papamanthou, “Dynamic provable data possession,” in Proc. 16th ACM Conf. Comput. Commun. Secure., 2009, pp. 213–222.
  12. R. D. Pietro, G. Ateniese, G. Tsudik, and L. V. Mancini, “Scalable and efficient provable data possession,” in Proc. 4th Int. Conf. Secur. Privacy Commun. Netw., 2008, Art. no. 9.
  13. K. Ren, J. Yu, V. Varadharajan, and C. Wang, “Enabling cloud storage auditing with key exposure resistance,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 6, pp. 1167–1179, Jun. 2015.
  14. J. Yu, C. Wang and K. Ren, “Enabling cloud storage auditing with verifiable outsourcing of key updates,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 6, pp. 1362–1375, Jun. 2016.
  15.  H. Wang and J. Yu, “Strong key-exposure resilient auditing for secure cloud storage,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 8, pp. 1931–1940, Aug. 2017.
  16.  J. Yu, R. Hao, H. Xia, H. Zhang and X. Cheng, “Intrusion resilient identity-based signatures: Concrete scheme in the standard model and generic construction,” Inf. Sci., vols. 442–443, pp. 158–172, May 2018.
  17. J. Yu, G. Yang, Z. Fu, R. Hao and W. Shen, “Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability,” J. Syst. Softw., vol. 113, pp. 130–139, Mar. 2016.
  18. B. Wang, H. Li and B. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” in Proc. IEEE 5th Int. Conf. Cloud Comput. (CLOUD), Jun. 2012, pp. 295–302.
  19. B. Wang, H. Li and B. Li, “Panda: Public auditing for shared data with efficient user revocation in the cloud,” IEEE Trans. Serv. Comput., vol. 8, no. 1, pp. 92–106, Jan./Feb. 2015.
  20. S. Yu, A. Fu, Y. Zhang, C. Huang and H. Wang, “NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users,” IEEE Trans. Big Data, to be published, doi: 10.1109/TBDATA.2017.2701347.
  21. Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, and K.-K. R. Choo, “Fuzzy identity-based data integrity auditing for reliable cloud storage systems,” IEEE Trans. Depend. Sec. Comput., to be published, doi: 10.1109/TDSC.2017.2662216.
  22. H. Wang, “Proxy provable data possession in public clouds,” IEEE Trans. Serv. Comput., vol. 6, no. 4, pp. 551–559, Oct./Dec. 2013.
  23. J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol with novel dynamic structure for cloud data,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 10, pp. 2402–2415, Oct. 2017.
  24. H. Shacham and B. Waters, “Compact proofs of retrievability,” J. Cryptol., vol. 26, no. 3, pp. 442–483, Jul. 2013.

Downloads

Published

2020-04-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. R. V. Mante, Nikhil R. Bajad, " Data Sharing using Searchable and Auditable ABE with Sensitive Detail Masking Technique, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 2, pp.336-342, March-April-2020.