TY - GEN
T1 - Secure and traceable framework for data circulation
AU - Liang, Kaitai
AU - Miyaji, Atsuko
AU - Su, Chunhua
PY - 2016/1/1
Y1 - 2016/1/1
N2 - To date the rapid growth of big data processing and its circulation among multiple organizations incur both promising prospects and security challenges for the corresponding technologies, such as data management, data analysis and so on. Efficient and secure data traceability is of critical importance for big data circulation, especially for cloud service applications which are not fully trusted and the risk of leakage of sensitive personal information. In this paper, we propose a framework for mutual traceability for data circulation and secure outsourced computation in data-centric cloud service. Our construction is built on top of searchable attribute-based proxy re-encryption. We enable both data owner and data user to trace their data circulation or perform privacy-preserving feedback. Specifically, the system enables data owners to efficiently distribute and trace his/her data to a specified group of cloud service providers who match a security/privacy policy and meanwhile, the data, maintaining its traceable property, can be further updated after being shared. The new mechanism is applicable to many real-world big data applications. Finally, our framework is proved chosen ciphertext secure in the random oracle model.
AB - To date the rapid growth of big data processing and its circulation among multiple organizations incur both promising prospects and security challenges for the corresponding technologies, such as data management, data analysis and so on. Efficient and secure data traceability is of critical importance for big data circulation, especially for cloud service applications which are not fully trusted and the risk of leakage of sensitive personal information. In this paper, we propose a framework for mutual traceability for data circulation and secure outsourced computation in data-centric cloud service. Our construction is built on top of searchable attribute-based proxy re-encryption. We enable both data owner and data user to trace their data circulation or perform privacy-preserving feedback. Specifically, the system enables data owners to efficiently distribute and trace his/her data to a specified group of cloud service providers who match a security/privacy policy and meanwhile, the data, maintaining its traceable property, can be further updated after being shared. The new mechanism is applicable to many real-world big data applications. Finally, our framework is proved chosen ciphertext secure in the random oracle model.
KW - Cloud services security
KW - Data circulation
KW - Data privacy
KW - Data traceability
UR - http://www.scopus.com/inward/record.url?scp=84978224297&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-40253-6_23
DO - 10.1007/978-3-319-40253-6_23
M3 - Conference contribution
AN - SCOPUS:84978224297
SN - 9783319402529
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 376
EP - 388
BT - Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings
A2 - Liu, Joseph K.
A2 - Steinfeld, Ron
PB - Springer
T2 - 21st Australasian Conference on Information Security and Privacy, ACISP 2016
Y2 - 4 July 2016 through 6 July 2016
ER -