DOI: 10.2298/CSIS100327029R

Study of Privacy-Preserving Framework for Cloud Storage

Huang RuWei1,2, Gui XiaoLin1, Yu Si1 and Zhuang Wei1

  1. Department of Electronics and Information Engineering, Xi’an Jiaotong University
    710049, Xian, China
    ruweih@126.com, xlgui@mail.xjtu.edu.cn , yusiing@126.com, zhuang2978002@126.com
  2. School of Computer, Electronics and Information
    GuangXi University, 530004, NanNing, China

Abstract

In order to implement privacy-preserving, efficient and secure data storage and access environment of cloud storage, the following problems must be considered: data index structure, generation and management of keys, data retrieval, treatments of change of users’ access right and dynamic operations on data, and interactions among participants. To solve those problems, the interactive protocol among participants is introduced, an extirpation-based key derivation algorithm (EKDA) is designed to manage the keys, a double hashed and weighted Bloom Filter (DWBF) is proposed to retrieve the encrypted keywords, which are combined with lazy revocation, multi-tree structure, asymmetric and symmetric encryptions, which form a privacy-preserving, efficient and secure framework for cloud storage. The experiment and security analysis show that EKDA can reduce the communication and storage overheads efficiently, DWBF supports ciphertext retrieval and can reduce communication, storage and computation overhead as well, and the proposed framework is privacy-preserving while supporting data access efficiently.

Key words

cloud storage, key derivation, Bloom Filter, privacy security, encrypted keyword retrieval

Digital Object Identifier (DOI)

https://doi.org/10.2298/CSIS100327029R

Publication information

Volume 8, Issue 3 (June 2011)
Year of Publication: 2011
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

RuWei, H., XiaoLin, G., Si, Y., Wei, Z.: Study of Privacy-Preserving Framework for Cloud Storage. Computer Science and Information Systems, Vol. 8, No. 3, 801-819. (2011), https://doi.org/10.2298/CSIS100327029R