Publication | Closed Access
Anonymous and Traceable Group Data Sharing in Cloud Computing
251
Citations
24
References
2017
Year
EngineeringInformation SecurityPseudonymizationData ScienceData AnonymizationPrivacy-preserving CommunicationData SharingData ManagementPrivacy Enhancing TechnologyData PrivacyCloud Computing SecurityComputer SciencePrivacyData SecurityCryptographyGroup DataCloud ComputingCloud CryptographyBlockchain
Group data sharing in cloud environments is a pressing issue, requiring secure and efficient solutions that also preserve anonymity while allowing traceability. This paper aims to enable secure, efficient, anonymous data sharing and storage for a group in the cloud. The authors propose a traceable group data sharing scheme that combines group signatures for anonymous communication with a key‑agreement‑derived conference key, using a symmetric balanced incomplete block design to simplify key generation. Theoretical and experimental results show the scheme is secure and efficient for cloud group data sharing.
Group data sharing in cloud environments has become a hot topic in recent decades. With the popularity of cloud computing, how to achieve secure and efficient data sharing in cloud environments is an urgent problem to be solved. In addition, how to achieve both anonymity and traceability is also a challenge in the cloud for data sharing. This paper focuses on enabling data sharing and storage for the same group in the cloud with high security and efficiency in an anonymous manner. By leveraging the key agreement and the group signature, a novel traceable group data sharing scheme is proposed to support anonymous multiple users in public clouds. On the one hand, group members can communicate anonymously with respect to the group signature, and the real identities of members can be traced if necessary. On the other hand, a common conference key is derived based on the key agreement to enable group members to share and store their data securely. Note that a symmetric balanced incomplete block design is utilized for key generation, which substantially reduces the burden on members to derive a common conference key. Both theoretical and experimental analyses demonstrate that the proposed scheme is secure and efficient for group data sharing in cloud computing.
| Year | Citations | |
|---|---|---|
Page 1
Page 1