Abstract

Recently, many enterprises have moved their data into the cloud by using file syncing and sharing (FSS) services, which have been deployed for mobile users. However, Bring-Your-Own-Device (BYOD) solutions for increasingly deployed mobile devices have also in fact raised a new challenge for how to prevent users from abusing the FSS service. In this paper, we address this issue by using a new system model involving anomaly detection, tracing, and revocation approaches. The presented solution applies a new threshold public key based cryptosystem, called partially-ordered hierarchical encryption (PHE), which implements a partial-order key hierarchy and it is similar to role hierarchy widely used in RBAC. PHE provides two main security mechanisms, i.e., traitor tracing and key revocation, which can greatly improve the efficiency compared to previous approaches. The security and performance analysis shows that PHE is a provably secure threshold encryption and provides following salient management and performance benefits: it can promise to efficiently trace all possible traitor coalitions and support public revocation not only for the users but for the specified groups.

Original languageEnglish (US)
Article number7479486
Pages (from-to)1110-1124
Number of pages15
JournalIEEE Transactions on Cloud Computing
Volume6
Issue number4
DOIs
StatePublished - Oct 1 2018

Fingerprint

Cryptography
Mobile devices
Industry

Keywords

  • Cloud storage
  • File syncing-and-sharing
  • Partial order key hierarchy
  • Revocation
  • Security
  • Traitor tracing

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Cite this

Phe : An efficient traitor tracing and revocation for encrypted file syncing-and-sharing in cloud. / Zhu, Yan; Gan, Guohua; Guo, Ruiqi; Huang, Dijiang.

In: IEEE Transactions on Cloud Computing, Vol. 6, No. 4, 7479486, 01.10.2018, p. 1110-1124.

Research output: Contribution to journalArticle

@article{c84d20b2c907416f8aae0b69c1c77ce7,
title = "Phe: An efficient traitor tracing and revocation for encrypted file syncing-and-sharing in cloud",
abstract = "Recently, many enterprises have moved their data into the cloud by using file syncing and sharing (FSS) services, which have been deployed for mobile users. However, Bring-Your-Own-Device (BYOD) solutions for increasingly deployed mobile devices have also in fact raised a new challenge for how to prevent users from abusing the FSS service. In this paper, we address this issue by using a new system model involving anomaly detection, tracing, and revocation approaches. The presented solution applies a new threshold public key based cryptosystem, called partially-ordered hierarchical encryption (PHE), which implements a partial-order key hierarchy and it is similar to role hierarchy widely used in RBAC. PHE provides two main security mechanisms, i.e., traitor tracing and key revocation, which can greatly improve the efficiency compared to previous approaches. The security and performance analysis shows that PHE is a provably secure threshold encryption and provides following salient management and performance benefits: it can promise to efficiently trace all possible traitor coalitions and support public revocation not only for the users but for the specified groups.",
keywords = "Cloud storage, File syncing-and-sharing, Partial order key hierarchy, Revocation, Security, Traitor tracing",
author = "Yan Zhu and Guohua Gan and Ruiqi Guo and Dijiang Huang",
year = "2018",
month = "10",
day = "1",
doi = "10.1109/TCC.2016.2573299",
language = "English (US)",
volume = "6",
pages = "1110--1124",
journal = "IEEE Transactions on Cloud Computing",
issn = "2168-7161",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

TY - JOUR

T1 - Phe

T2 - An efficient traitor tracing and revocation for encrypted file syncing-and-sharing in cloud

AU - Zhu, Yan

AU - Gan, Guohua

AU - Guo, Ruiqi

AU - Huang, Dijiang

PY - 2018/10/1

Y1 - 2018/10/1

N2 - Recently, many enterprises have moved their data into the cloud by using file syncing and sharing (FSS) services, which have been deployed for mobile users. However, Bring-Your-Own-Device (BYOD) solutions for increasingly deployed mobile devices have also in fact raised a new challenge for how to prevent users from abusing the FSS service. In this paper, we address this issue by using a new system model involving anomaly detection, tracing, and revocation approaches. The presented solution applies a new threshold public key based cryptosystem, called partially-ordered hierarchical encryption (PHE), which implements a partial-order key hierarchy and it is similar to role hierarchy widely used in RBAC. PHE provides two main security mechanisms, i.e., traitor tracing and key revocation, which can greatly improve the efficiency compared to previous approaches. The security and performance analysis shows that PHE is a provably secure threshold encryption and provides following salient management and performance benefits: it can promise to efficiently trace all possible traitor coalitions and support public revocation not only for the users but for the specified groups.

AB - Recently, many enterprises have moved their data into the cloud by using file syncing and sharing (FSS) services, which have been deployed for mobile users. However, Bring-Your-Own-Device (BYOD) solutions for increasingly deployed mobile devices have also in fact raised a new challenge for how to prevent users from abusing the FSS service. In this paper, we address this issue by using a new system model involving anomaly detection, tracing, and revocation approaches. The presented solution applies a new threshold public key based cryptosystem, called partially-ordered hierarchical encryption (PHE), which implements a partial-order key hierarchy and it is similar to role hierarchy widely used in RBAC. PHE provides two main security mechanisms, i.e., traitor tracing and key revocation, which can greatly improve the efficiency compared to previous approaches. The security and performance analysis shows that PHE is a provably secure threshold encryption and provides following salient management and performance benefits: it can promise to efficiently trace all possible traitor coalitions and support public revocation not only for the users but for the specified groups.

KW - Cloud storage

KW - File syncing-and-sharing

KW - Partial order key hierarchy

KW - Revocation

KW - Security

KW - Traitor tracing

UR - http://www.scopus.com/inward/record.url?scp=85058329032&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85058329032&partnerID=8YFLogxK

U2 - 10.1109/TCC.2016.2573299

DO - 10.1109/TCC.2016.2573299

M3 - Article

AN - SCOPUS:85058329032

VL - 6

SP - 1110

EP - 1124

JO - IEEE Transactions on Cloud Computing

JF - IEEE Transactions on Cloud Computing

SN - 2168-7161

IS - 4

M1 - 7479486

ER -