Secure and efficient access to outsourced data

  • Authors:
  • Weichao Wang;Zhiwei Li;Rodney Owens;Bharat Bhargava

  • Affiliations:
  • UNC Charlotte, Charlotte, NC, USA;UNC Charlotte, Charlotte, NC, USA;UNC Charlotte, Charlotte, NC, USA;Purdue University, West Lafayette, IN, USA

  • Venue:
  • Proceedings of the 2009 ACM workshop on Cloud computing security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Providing secure and efficient access to large scale outsourced data is an important component of cloud computing. In this paper, we propose a mechanism to solve this problem in owner-write-users-read applications. We propose to encrypt every data block with a different key so that flexible cryptography-based access control can be achieved. Through the adoption of key derivation methods, the owner needs to maintain only a few secrets. Analysis shows that the key derivation procedure using hash functions will introduce very limited computation overhead. We propose to use over-encryption and/or lazy revocation to prevent revoked users from getting access to updated data blocks. We design mechanisms to handle both updates to outsourced data and changes in user access rights. We investigate the overhead and safety of the proposed approach, and study mechanisms to improve data access efficiency.