Data Sharing and Sensitive Information Hiding with Revocation System in Cloud
Keywords:
Cloud Storage, Data Sharing, Electronic Health Record, Sanitizer, Sensitive Information.Abstract
With the explosive growth of data, it is a heavy burden for users to store a large amount of data locally. Therefore, more and more organizations and individuals would like to store their data in the cloud. It provides a storage platform for enterprises and individuals. Cloud storage provides users with immediate access to a broad range of resources and applications hosted in the infrastructure of another organization via a web service interface. Storage maintenance tasks, such as purchasing additional storage capacity, are offloaded to the responsibility of a service provider. The security issues are one of the main exposures in cloud storage auditing. The Electronic Health Record (EHR), which is commonly used as cloud storage, contains some sensitive information and this sensitive information can be uncovered when cloud files are shared. Encrypting the entire shared file can realize the sensitive information hiding; however will make this shared file unable to be utilized by others. The most effective method to acknowledge data sharing to sensitive information hiding in remote data integrity auditing still has not been investigated up to now. We addressed such types of problems by proposing a Revocation algorithm for reliable data sharing with sensitive information hiding. The proposed system sanitized data block with respect to sensitive information of files and transforms these data block’s signatures into valid ones for the sanitized file. The signature is used to verify the integrity of a sanitized file during an integrity audit. This technology can ensure the storage and sharing of files in the cloud and hide sensitive information.
References
- k. ren, c. wang, j. yu and v. varadharajan, “enabling cloud storage auditing with key-exposure resistance,” IEEE [2015]
- b. li, b. wang and h. li, “panda: public auditing for shared data with efficient user revocation in the cloud,” [2015]
- d. wang, m. xu, s. fu y. luo and j. deng, “efficient integrity auditing for shared data in the cloud with secure user revocation,” [2015]
- k. ren, j. yu and c. wang, “enabling cloud storage auditing with verifiable outsourcing of key updates,” [2016]
- w. shen, g. yang, q. su, z. fu, j. yu, and r. hao, “enabling public auditing for shared data in cloud storage supporting identity privacy and traceability,” [2016]
- d. he, h. wang, and s. tang, “identity-based proxy oriented data uploading and remote data integrity checking in public cloud,” [2016]
- d. xie, j. li, j. li and z. cai, “secure auditing and deduplicating data in cloud,” [2016]
- d. koo, j. hur, y. shin and k. kang, “secure data deduplication with dynamic ownership management in cloud storage,” [2016]
- h. zhang, x. lu, w. shen, h. xia, j. yu, and r. hao, “light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium,”, [2017]
- jiayu, wentingshen, jingqin, ronghao, and jiankunhu, “enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage”, [2018]
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.