CFP last date
20 December 2024
Reseach Article

Privacy-Preserving Protocol in Multi-User Cloud

by Somayeh Sobati Moghadam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 5
Year of Publication: 2017
Authors: Somayeh Sobati Moghadam
10.5120/ijca2017915620

Somayeh Sobati Moghadam . Privacy-Preserving Protocol in Multi-User Cloud. International Journal of Computer Applications. 176, 5 ( Oct 2017), 9-12. DOI=10.5120/ijca2017915620

@article{ 10.5120/ijca2017915620,
author = { Somayeh Sobati Moghadam },
title = { Privacy-Preserving Protocol in Multi-User Cloud },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 176 },
number = { 5 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number5/28546-2017915620/ },
doi = { 10.5120/ijca2017915620 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:41:41.930637+05:30
%A Somayeh Sobati Moghadam
%T Privacy-Preserving Protocol in Multi-User Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 5
%P 9-12
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Outsourcing data in the cloud environment has recently gained special attention. However, data privacy remains one of the top concerns for users in cloud outsourcing scenarios. In this paper, we propose a privacy preserving query protocol based on proxy re-encryption schemes. The proposed protocol protects data privacy of all users in a multi-user cloud setting. Data privacy is preserved against honest but curious adversary model.

References
  1. Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo, and Mihaela Ion. Supporting complex queries and access policies for multi-user encrypted databases. In Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop, CCSW ’13, pages 77–88, New York, NY, USA, 2013. ACM.
  2. Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1–30, February 2006.
  3. Matt Blaze and Martin Strauss. Atomic proxy cryptography. Technical report, Proc. EuroCrypt ’97, 1998.
  4. Fangquan Cheng, Qian Wang, Qianwen Zhang, and Zhiyong Peng. Highly efficient indexing for privacy-preserving multikeyword query over encrypted cloud data. In Web-Age Information Management, pages 348–359. Springer, 2014.
  5. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. Keep a few: Outsourcing data while maintaining confidentiality. In Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, pages 440–455, 2009.
  6. Ernesto Damiani, S. De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. Key management for multi-user encrypted databases. In Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, StorageSS ’05, pages 74–83, New York, NY, USA, 2005. ACM.
  7. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst., 35(2), 2010.
  8. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Efficient and private access to outsourced data. In 2011 International Conference on Distributed Computing Systems, ICDCS 2011, Minneapolis, Minnesota, USA, June 20-24, 2011, pages 710– 719, 2011.
  9. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, and Pierangela Samarati. privacy of outsourced data. In Digital Privacy: Theory, Technologies, and Practices, pages 382–405, 2007.
  10. Sara Foresti. Preserving privacy in data outsourcing, volume 99. Springer Science & Business Media, 2010.
  11. Anca Ivan and Yevgeniy Dodis. Proxy cryptography revisited. In in Proceedings of the Network and Distributed System Security Symposium (NDSS, 2003.
  12. Adriana Lopez-Alt, Eran Tromer, and Vinod Vaikuntanathan. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. Cryptology ePrint Archive, Report 2013/094, 2013. http://eprint.iacr.org/2013/ 094.
  13. Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. Cryptdb: protecting confidentiality with encrypted query processing. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, SOSP 2011, Cascais, Portugal, October 23-26, 2011, pages 85–100, 2011.
  14. Raluca A. Popa and Nickolai Zeldovich. Multi-key searchable encryption. IACR Cryptology ePrint Archive, 2013:508, 2013.
  15. Raluca Ada Popa and Nickolai Zeldovich. Multi-key searchable encryption. Cryptology ePrint Archive, Report 2013/508, 2013. http://eprint.iacr.org/.
  16. Stephen Tu, M. Frans Kaashoek, Samuel Madden, and Nickolai Zeldovich. Processing analytical queries over encrypted data. Proceedings of the VLDB Endowment, PVLDB, 6(5):289–300, 2013.
  17. Li Xiong, Subramanyam Chitti, and Ling Liu. Preserving data privacy in outsourcing data aggregation services. ACM Trans. Internet Technol., 7(3), August 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Privacy-Preserving Protocol Data Privacy Cloud Computing Multi-User