메뉴 건너뛰기




Volumn 18, Issue 4, 2017, Pages 833-842

A secure identity-based dynamic group data sharing scheme for cloud computing

Author keywords

Cloud computing; Group data sharing; Identity based; Searchable encryption

Indexed keywords

AUTHENTICATION; CLOUD COMPUTING; NETWORK FUNCTION VIRTUALIZATION;

EID: 85028448989     PISSN: 16079264     EISSN: 20794029     Source Type: Journal    
DOI: 10.6138/JIT.2017.18.4.20160415     Document Type: Article
Times cited : (13)

References (43)
  • 4
    • 85028454481 scopus 로고    scopus 로고
    • Storage Newsletter, Emerging 2012 Cloud Storage Trend by TwinStrata, http://www.storagenewsletter.com/rubriques/market-reportsresearch/emerging- 2012-cloud-storage-trend-twinstrata/.
    • Emerging 2012 Cloud Storage Trend by TwinStrata
  • 6
    • 84924368818 scopus 로고    scopus 로고
    • Security in cloud computing: Opportunities and challenges
    • June
    • M. Ali, S. U. Khan and A. V. Vasilakos, Security in Cloud Computing: Opportunities and Challenges, Information Sciences, Vol. 305, pp. 357-383, June, 2015.
    • (2015) Information Sciences , vol.305 , pp. 357-383
    • Ali, M.1    Khan, S.U.2    Vasilakos, A.V.3
  • 7
    • 84929085499 scopus 로고    scopus 로고
    • State-of-the-art survey on cloud computing security challenges, approaches and solutions
    • F. Shahzad, State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions, Procedia Computer Science, Vol. 37, pp. 357-362, 2014.
    • (2014) Procedia Computer Science , vol.37 , pp. 357-362
    • Shahzad, F.1
  • 8
    • 84973560504 scopus 로고    scopus 로고
    • An efficient RFID authentication protocol providing strong privacy and security
    • May
    • J. Shen, H. Tan, S. Moh, I. Chung and J. Wang, An Efficient RFID Authentication Protocol Providing Strong Privacy and Security, Journal of Internet Technology, Vol. 17, No. 3, pp. 443-455, May, 2016.
    • (2016) Journal of Internet Technology , vol.17 , Issue.3 , pp. 443-455
    • Shen, J.1    Tan, H.2    Moh, S.3    Chung, I.4    Wang, J.5
  • 9
    • 84890369044 scopus 로고    scopus 로고
    • An efficient verifiably encrypted signature from weil pairing
    • November
    • J. Shen, W. Zheng, J. Wang, Y. Zheng, X. Sun and S. Lee, An Efficient Verifiably Encrypted Signature from Weil Pairing, Journal of Internet Technology, Vol. 14, No. 6, pp. 947-952, November, 2013.
    • (2013) Journal of Internet Technology , vol.14 , Issue.6 , pp. 947-952
    • Shen, J.1    Zheng, W.2    Wang, J.3    Zheng, Y.4    Sun, X.5    Lee, S.6
  • 10
    • 84872875967 scopus 로고    scopus 로고
    • Identity-based key agreement protocol employing a symmetric balanced incomplete block design
    • December
    • J. Shen, S. Moh and I. Chung, Identity-based Key Agreement Protocol Employing a Symmetric Balanced Incomplete Block Design, Journal of Communications and Networks, Vol. 14, No. 6, pp. 682-691, December, 2012.
    • (2012) Journal of Communications and Networks , vol.14 , Issue.6 , pp. 682-691
    • Shen, J.1    Moh, S.2    Chung, I.3
  • 11
    • 84947804555 scopus 로고    scopus 로고
    • Enhanced secure sensor association and key management in wireless body area networks
    • October
    • J. Shen, H. Tan, S. Moh, I. Chung, Q. Liu and X. Sun, Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks, Journal of Communications and Networks, Vol. 17, No. 5, pp. 453-462, October, 2015.
    • (2015) Journal of Communications and Networks , vol.17 , Issue.5 , pp. 453-462
    • Shen, J.1    Tan, H.2    Moh, S.3    Chung, I.4    Liu, Q.5    Sun, X.6
  • 12
    • 84863392301 scopus 로고    scopus 로고
    • Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
    • April
    • Z. Wan, J. Liu and R. H. Deng, HASBE: A Hierarchical Attribute-based Solution for Flexible and Scalable Access Control in Cloud Computing, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, pp. 743-754, April, 2012.
    • (2012) IEEE Transactions on Information Forensics and Security , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.H.3
  • 13
  • 14
    • 84886903289 scopus 로고    scopus 로고
    • DAC-Macs: Effective data access control for multiauthority cloud storage systems
    • November
    • K. Yang, X. Jia, K. Ren, B. Zhang and R. Xie, DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 11, pp. 1790-1801, November, 2013.
    • (2013) IEEE Transactions on Information Forensics and Security , vol.8 , Issue.11 , pp. 1790-1801
    • Yang, K.1    Jia, X.2    Ren, K.3    Zhang, B.4    Xie, R.5
  • 15
    • 84961742903 scopus 로고    scopus 로고
    • Secure and verifiable policy update outsourcing for big data access control in the cloud
    • December
    • K. Yang, X. Jia and K. Ren, Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud, IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 12, pp. 3461-3470, December, 2015.
    • (2015) IEEE Transactions on Parallel and Distributed Systems , vol.26 , Issue.12 , pp. 3461-3470
    • Yang, K.1    Jia, X.2    Ren, K.3
  • 16
    • 84903121888 scopus 로고    scopus 로고
    • Expressive efficient and revocable data access control for multi-authority cloud storage
    • July
    • K. Yang and X. Jia, Expressive, Efficient, and Revocable Data Access Control for Multi-authority Cloud Storage, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 7, pp. 1735-1744, July, 2014.
    • (2014) IEEE Transactions on Parallel and Distributed Systems , vol.25 , Issue.7 , pp. 1735-1744
    • Yang, K.1    Jia, X.2
  • 17
    • 84891761004 scopus 로고    scopus 로고
    • Decentralized access control with anonymous authentication of data stored in clouds
    • February
    • S. Ruj, M. Stojmenovic and A. Nayak, Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 2, pp. 384-394, February, 2014.
    • (2014) IEEE Transactions on Parallel and Distributed Systems , vol.25 , Issue.2 , pp. 384-394
    • Ruj, S.1    Stojmenovic, M.2    Nayak, A.3
  • 18
    • 84922323888 scopus 로고    scopus 로고
    • A novel routing protocol providing good transmission reliability in underwater sensor networks
    • January
    • J. Shen, H. Tan, J. Wang, J. Wang and S. Lee, A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks, Journal of Internet Technology, Vol. 16, No. 1, pp. 171-178, January, 2015.
    • (2015) Journal of Internet Technology , vol.16 , Issue.1 , pp. 171-178
    • Shen, J.1    Tan, H.2    Wang, J.3    Wang, J.4    Lee, S.5
  • 19
    • 84992121665 scopus 로고    scopus 로고
    • Attribute-based access control with constant-size ciphertext in cloud computing
    • W. Teng, G. Yang, Y. Xiang, T. Zhang and D. Wang, Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing, IEEE Transactions on Cloud Computing, 2015, doi: 10.1109/TCC.2015.2440247.
    • IEEE Transactions on Cloud Computing , vol.2015
    • Teng, W.1    Yang, G.2    Xiang, Y.3    Zhang, T.4    Wang, D.5
  • 20
    • 85030113648 scopus 로고    scopus 로고
    • Flexible data access control based on trust and reputation in cloud computing
    • Z. Yan, X. Li, M. Wang and A. V. Vasilakos, Flexible Data Access Control Based on Trust and Reputation in Cloud Computing, IEEE Transactions on Cloud Computing, Vol. 2015, 2015, doi: 10.1109/TCC.2015.2469662.
    • (2015) IEEE Transactions on Cloud Computing , vol.2015
    • Yan, Z.1    Li, X.2    Wang, M.3    Vasilakos, A.V.4
  • 21
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • July-August
    • C. Wang, K. Ren, W. Lou and J. Li, Toward Publicly Auditable Secure Cloud Data Storage Services, IEEE Network: The Magazine of Global Internetworking, Vol. 24, No. 4, pp. 19-24, July-August, 2010.
    • (2010) IEEE Network: The Magazine of Global Internetworking , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 22
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • May
    • Q. Wang, C. Wang, K. Ren, W. Lou and J. Li, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 5, pp. 847-859, May, 2011.
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 23
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • April-June
    • C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, Toward Secure and Dependable Storage Services in Cloud Computing, IEEE Transactions on Services Computing, Vol. 5, No. 2, pp. 220-232, April-June, 2012.
    • (2012) IEEE Transactions on Services Computing , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 24
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • February
    • C. Wang, S. S. M. Chow, Q. Wang, K. Ren and W. Lou, Privacy-preserving Public Auditing for Secure Cloud Storage, IEEE Transactions on Computers, Vol. 62, No. 2, pp. 362-375, February, 2013.
    • (2013) IEEE Transactions on Computers , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 25
    • 84881080693 scopus 로고    scopus 로고
    • An efficient and secure dynamic auditing protocol for data storage in cloud computing
    • September
    • K. Yang and X. Jia, An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 9, pp. 1717-1726, September, 2013.
    • (2013) IEEE Transactions on Parallel and Distributed Systems , vol.24 , Issue.9 , pp. 1717-1726
    • Yang, K.1    Jia, X.2
  • 26
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • March
    • Y. Ren, J. Shen, J. Wang, J. Han and S. Lee, Mutual Verifiable Provable Data Auditing in Public Cloud Storage, Journal of Internet Technology, Vol. 16, No. 2, pp. 317-323, March, 2015.
    • (2015) Journal of Internet Technology , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 28
    • 84934283890 scopus 로고    scopus 로고
    • Public integrity auditing for dynamic data sharing with multiuser modification
    • August
    • J. Yuan and S. Yu, Public Integrity Auditing for Dynamic Data Sharing with Multiuser Modification, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 8, pp. 1717-1726, August, 2015.
    • (2015) IEEE Transactions on Information Forensics and Security , vol.10 , Issue.8 , pp. 1717-1726
    • Yuan, J.1    Yu, S.2
  • 29
    • 84960539113 scopus 로고    scopus 로고
    • Verifiable auditing for outsourced database in cloud computing
    • November
    • J. Wang, X. Chen, X. Huang, I. You and Y. Xiang, Verifiable Auditing for Outsourced Database in Cloud Computing, IEEE Transactions on Computers, Vol. 64, No. 11, pp. 3293-3303, November, 2015.
    • (2015) IEEE Transactions on Computers , vol.64 , Issue.11 , pp. 3293-3303
    • Wang, J.1    Chen, X.2    Huang, X.3    You, I.4    Xiang, Y.5
  • 30
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • August
    • C. Wang, N. Cao, K. Ren and W. Lou, Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 8, pp. 1467-1479, August, 2012.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 31
    • 84924804821 scopus 로고    scopus 로고
    • Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage
    • March
    • H. Li, D. Liu, Y. Dai, T. H. Luan and X. S. Shen, Enabling Efficient Multi-keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage, IEEE Transactions on Emerging Topics in Computing, Vol. 3, No. 1, pp. 127-138, March, 2015.
    • (2015) IEEE Transactions on Emerging Topics in Computing , vol.3 , Issue.1 , pp. 127-138
    • Li, H.1    Liu, D.2    Dai, Y.3    Luan, T.H.4    Shen, X.S.5
  • 32
    • 84963939892 scopus 로고    scopus 로고
    • Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing
    • May
    • W. Zhang, Y. Lin, S. Xiao, J. Wu and S. Zhou, Privacy Preserving Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing, IEEE Transactions on Computers, Vol. 65, No. 5, pp. 1566-1577, May, 2016.
    • (2016) IEEE Transactions on Computers , vol.65 , Issue.5 , pp. 1566-1577
    • Zhang, W.1    Lin, Y.2    Xiao, S.3    Wu, J.4    Zhou, S.5
  • 33
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • February
    • Z. Xia, X. Wang, X. Sun and Q. Wang, A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, Vol. 27, No. 2, pp. 340-352, February, 2016.
    • (2016) IEEE Transactions on Parallel and Distributed Systems , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 34
    • 84897586040 scopus 로고    scopus 로고
    • Toward secure multikeyword top-k retrieval over encrypted cloud data
    • July- August
    • J. Yu, P. Lu. Y. Zhu, G. Xue and M. Li, Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data, IEEE Transactions on Dependable and Secure Computing, Vol. 10, No. 4, pp. 239-250, July- August, 2013.
    • (2013) IEEE Transactions on Dependable and Secure Computing , vol.10 , Issue.4 , pp. 239-250
    • Yu, J.1    Lu, P.2    Zhu, Y.3    Xue, G.4    Li, M.5
  • 35
    • 84908108453 scopus 로고    scopus 로고
    • Verifiable privacy-preserving multikeyword text search in the cloud supporting similarity-based ranking
    • November
    • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou and H. Li, Verifiable Privacy-preserving Multikeyword Text Search in the Cloud Supporting Similarity-based Ranking, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 11, pp. 3025-3035, November, 2014.
    • (2014) IEEE Transactions on Parallel and Distributed Systems , vol.25 , Issue.11 , pp. 3025-3035
    • Sun, W.1    Wang, B.2    Cao, N.3    Li, M.4    Lou, W.5    Hou, Y.T.6    Li, H.7
  • 36
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: Multikeyword ranked search over encrypted cloud data supporting parallel computing
    • January
    • Z. Fu, X. Sun, Q. Liu, L. Zhou and J. Shu, Achieving Efficient Cloud Search Services: Multikeyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing, IEICE Transactions on Communications, Vol. E98-B, No. 1, pp. 190-200, January, 2015.
    • (2015) IEICE Transactions on Communications , vol.E98-B , Issue.1 , pp. 190-200
    • Fu, Z.1    Sun, X.2    Liu, Q.3    Zhou, L.4    Shu, J.5
  • 37
    • 84905923774 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • January
    • N. Cao, C. Wang, M. Li, K. Ren and W. Lou, Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 1, pp. 222-233, January, 2014.
    • (2014) IEEE Transactions on Parallel and Distributed Systems , vol.25 , Issue.1 , pp. 222-233
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 38
    • 84877786210 scopus 로고    scopus 로고
    • Mona: Secure multi-owner data sharing for dynamic groups in the cloud
    • June
    • X. Liu, Y. Zhang, B. Wang and J. Yan, Mona: Secure Multi-owner Data Sharing for Dynamic Groups in the Cloud, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 6, pp. 1182-1191, June, 2013.
    • (2013) IEEE Transactions on Parallel and Distributed Systems , vol.24 , Issue.6 , pp. 1182-1191
    • Liu, X.1    Zhang, Y.2    Wang, B.3    Yan, J.4
  • 39
    • 84922323123 scopus 로고    scopus 로고
    • A dynamic secure group sharing framework in public cloud computing
    • October-December
    • K. Xue and P. Hong, A Dynamic Secure Group Sharing Framework in Public Cloud Computing, IEEE Transactions on Cloud Computing, Vol. 2, No. 4, pp. 459-470, October-December, 2014.
    • (2014) IEEE Transactions on Cloud Computing , vol.2 , Issue.4 , pp. 459-470
    • Xue, K.1    Hong, P.2
  • 40
    • 84978741646 scopus 로고    scopus 로고
    • Key-aggregate searchable encryption (kase) for group data sharing via cloud storage
    • August
    • B. Cui, Z. Liu and L. Wang, Key-aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage, IEEE Transactions on Computers, Vol. 65, No. 8, pp. 2374-2385, August, 2016.
    • (2016) IEEE Transactions on Computers , vol.65 , Issue.8 , pp. 2374-2385
    • Cui, B.1    Liu, Z.2    Wang, L.3
  • 41
    • 85018200280 scopus 로고    scopus 로고
    • Achieving secure scalable, and fine-grained data access control in cloud computing
    • San Diego, CA
    • S. Yu, C. Wang, K. Ren and W. Lou, Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, 29th Conference on Information Communications, San Diego, CA, 2010, pp. 534-542.
    • (2010) 29th Conference on Information Communications , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 42
    • 84901595577 scopus 로고    scopus 로고
    • Digital provenance: Enabling secure data forensics in cloud computing
    • July
    • J. Li, X. Chen, Q. Huang and D. S. Wong, Digital Provenance: Enabling Secure Data Forensics in Cloud Computing, Future Generation Computer Systems, Vol. 37, pp. 259-266, July, 2014.
    • (2014) Future Generation Computer Systems , vol.37 , pp. 259-266
    • Li, J.1    Chen, X.2    Huang, Q.3    Wong, D.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.