signature mechanism. They propose a multi-owner
data sharing scheme, MONA, for dynamic groups in
the cloud, while preserving identity privacy from un-
trusted servers. Nevertheless, MONA brings an extra
storage overhead at both the cloud and the group man-
ager side, for each outsourced data file.
In (Seo et al., 2013), Seo et al. propose an im-
proved mediated certificateless approach, in order to
secure data sharing in cloud servers. In fact, the ba-
sic concept of mediated cryptography is the usage of
a security mediator (SEM) which can control secu-
rity capabilities for the participating entities. Once
the SEM is notified that a group member is revoked,
it can immediately stop the user scenario. Unfortu-
nately, similarly to a proxy re-encryption scheme, this
approach involves a trusted third party, in order to
generate the partially decrypting keys. That is, it re-
quires additional storage capacities and computation
cost overhead, while considering flexible user man-
agement mechanisms.
7 CONCLUSIONS
The growing need for secure cloud sharing services
and the attractive properties of the convergent cryp-
tography lead us to combine them, thus, defining an
innovative solution to the data outsourcing security
and efficiencyissues. In this paper,we design a secure
data sharing scheme CloudaSec, for dynamic groups
in untrusted cloud storage environments. Our ap-
proach ensures the confidentiality of outsourced data
in public untrusted cloud servers and defines a smooth
group revocation mechanisms. That is, flexible access
control policies are enforced among users belonging
to separate groups with different privileges.
Our experimental results show the efficiency of
CloudaSec in scalable data sharing, while consider-
ing the impact of the cryptographic operations at the
client side.
REFERENCES
https://github.com/openstack/swift.
Ateniese, G., Fu, K., Green, M., and Hohenberger, S. Im-
proved proxy re-encryption schemes with applications
to secure distributed storage. ACM Trans. Inf. Syst. Se-
cur., 9:1–30.
Ben, L. (2007). On the implementation of pairing-based
cryptosystems.
Boneh, D. and Boyen, X. (2006). On the impossibility of ef-
ficiently combining collision resistant hash functions.
In In Proc. Crypto 06, pages 570–583.
Burmester, M. and Desmedt, Y. (2005). A secure and scal-
able group key exchange system. Inf. Process. Lett.,
94(3).
Dierks, T. and Rescorla, E. (2008). RFC 5246 - The Trans-
port Layer Security (TLS) Protocol Version 1.2. Tech-
nical report.
et al., T. G. (2002). GNU multiple precision arithmetic li-
brary 4.1.2.
Fugkeaw, S. (2012). Achieving privacy and security in
multi-owner data outsourcing. pages 239–244. IEEE.
Gantz, B. J. and Reinsel, D. (2012). The digital universe
in 2020: Big data, bigger digital shadows, and biggest
growth in the far east. IDC iView, (December):1–16.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In Proceedings of the 13th
ACM conference on Computer and communications
security, CCS ’06, pages 89–98. ACM.
Liu, X., Zhang, Y., Wang, B., and Yan, J. (2013). Mona:
Secure multi-owner data sharing for dynamic groups
in the cloud. IEEE Trans. Parallel Distrib. Syst., 24(6).
Ratna, D., Rana, B., and Palash, S. (2004). Pairing-based
cryptographic protocols : A survey.
Regan, K. W. Minimum-complexity pairing functions.
Seo, S.-H., Nabeel, M., Ding, X., and Bertino, E. (2013).
An efficient certificateless encryption for secure data
sharing in public clouds. IEEE Transactions on
Knowledge and Data Engineering, 99:1.
The OpenSSL Project (2003).
Wang, C., guang Qin, Z., Peng, J., and Wang, J. (2010). A
novel encryption scheme for data deduplication sys-
tem. pages 265–269.
Xiong, H., Zhang, X., Yao, D., Wu, X., and Wen, Y. (2012).
Towards end-to-end secure content storage and deliv-
ery with public cloud. CODASPY ’12, pages 257–
266. ACM.
Yu, S., Wang, C., Ren, K., and Lou, W. (2010). Achieving
secure, scalable, and fine-grained data access control
in cloud computing. INFOCOM’10, pages 534–542.
Zarandioon, S., Yao, D. D., and Ganapathy, V. (2011). K2c:
Cryptographic cloud storage with lazy revocation and
anonymous access. In SecureComm, volume 96, pages
59–76. Springer.
Zhou, L., Varadharajan, V., and Hitchens, M. (2011). En-
forcing role-based access control for secure data stor-
age in the cloud. Comput. J., 54.
SECRYPT2014-InternationalConferenceonSecurityandCryptography
18