3.8 Article

A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment

期刊

BAGHDAD SCIENCE JOURNAL
卷 19, 期 6, 页码 1572-1580

出版社

COLL SCIENCE WOMEN, UNIV BAGHDAD
DOI: 10.21123/bsj.2022.7077

关键词

Encryption; Cloud Computing; CP-ABE based encryption; Privacy; Security

向作者/读者索取更多资源

Cloud computing plays a prominent role in our day-to-day lives, offering robustness, cost-effectiveness, and pervasive nature. However, ensuring data security and privacy remains a challenge. This paper proposes a method that utilizes order-preserving symmetric encryption (OPES) to track malicious users and protect system security.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses orderpreserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据