Secure Data Storage and Sharing Techniques in Cloud Computing

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Processes".

Deadline for manuscript submissions: closed (1 March 2017) | Viewed by 35843

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computing, Hong Kong Polytechnic University, Hong Kong
Interests: information security; public key cryptography

E-Mail Website
Guest Editor
Jiangsu Provincial Key Laboratory of E-Business, College of Information Engineering, Nanjing University of Finance and Economics, China
Interests: cryptography; access control; cloud computing; network security

E-Mail Website
Guest Editor
Department of Software Systems & Cybersecurity, Faculty of Information Technology, Monash University, Clayton, VIC 3800, Australia
Interests: applied cryptography; blockchain

E-Mail Website
Guest Editor
Mathematical Institute, University of Oxford, UK
Interests: cryptography; number theory; information security

Special Issue Information

Dear Colleagues,

Cloud computing is an increasingly popular computing paradigm where a user can outsource his data to a third party called a cloud service provider. Since it can dramatically reduce the management task on massive data, cloud computing has been focused on extensively in both academic research community and industries. However, data storage and sharing in cloud environments raises serious security and privacy issues. Secure data storage and sharing techniques should be created to securely store and share data in cloud computing. Potential techniques can implement secure data storage and fine-grained data sharing without comprising the data confidentiality and user’s privacy.

Topics:

The aim of the proposed Special Issue for Information is to promote research and reflect the secure data storage and sharing techniques in cloud computing, with emphasis on the following aspects, but certainly not limited to:

  • Accountability
  • Attribute-based encryption
  • Electronic health records
  • Fine-grained access control techniques
  • New attacks and countermeasures
  • Oblivious cloud storage
  • Privacy-preserving techniques
  • Proof of data possession
  • Proofs of retrievability
  • Secure data de-duplication
  • Searchable encryption
  • Traceability
  • Trusted computing
  • Verifiable outsourced computation

Paper Solicitation

This issue is an open Special Issue where everyone is encouraged to submit papers. We will solicit papers through two ways: conference and open call-for-papers.

  1. Selected Papers from The 10th International Conference on Provable Security (ProvSec 2016)

ProvSec covers research on all theoretical and practical aspects related to cryptography and its applications. The aim of ProvSec is to provide a platform for researchers, scholars and practitioners to exchange new ideas for solving problems in the provable security area.  The conference website is at http://provsec2016.njue.edu.cn/index.html

We plan to select the papers relevant to secure data storage and sharing from the accepted papers based on the reviews (comments and scores) and the presentations during the conferences. Each selected paper must be substantially extended, with at least 30% difference from its conference version.

  1. Open Call-For-Papers

We also plan to publicize an open call-for-papers (CFP) by listing the CFP in major academic announcement mailing lists/websites and by sending the CFP to researchers in the areas around the world. We estimate there will be a number of submissions via the open call-for-papers. Then we plan to select another a few papers from the submissions.

Each paper (including the selected papers from the conference) will go through a rigorous peer-review process by at least three knowledgeable researchers. In total, we plan to include about 10 papers in this Special Issue. The acceptance rate will be fairly low as we regard quality as our top priority.

Dr. Man Ho Au
Dr. Jinguang Han
Dr. Joseph K. Liu
Dr. Ali El Kaafarani
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

268 KiB  
Article
A Novel Identity-Based Signcryption Scheme in the Standard Model
by Yueying Huang and Junjie Yang
Information 2017, 8(2), 58; https://doi.org/10.3390/info8020058 - 19 May 2017
Cited by 6 | Viewed by 4089
Abstract
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a standard model. In this paper, we address the issue [...] Read more.
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a standard model. In this paper, we address the issue and propose a novel construction of identity-based signcryption which enjoys IND-CCA security and existential unforgeability without resorting to the random oracle model. Comparisons demonstrate that the new scheme achieves stronger security, better performance efficiency and shorter system parameters. Full article
(This article belongs to the Special Issue Secure Data Storage and Sharing Techniques in Cloud Computing)
2668 KiB  
Article
BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments
by Qi Xia, Emmanuel Boateng Sifah, Abla Smahi, Sandro Amofa and Xiaosong Zhang
Information 2017, 8(2), 44; https://doi.org/10.3390/info8020044 - 17 Apr 2017
Cited by 444 | Viewed by 26909
Abstract
Disseminating medical data beyond the protected cloud of institutions poses severe risks to patients’ privacy, as breaches push them to the point where they abstain from full disclosure of their condition. This situation negatively impacts the patient, scientific research, and all stakeholders. To [...] Read more.
Disseminating medical data beyond the protected cloud of institutions poses severe risks to patients’ privacy, as breaches push them to the point where they abstain from full disclosure of their condition. This situation negatively impacts the patient, scientific research, and all stakeholders. To address this challenge, we propose a blockchain-based data sharing framework that sufficiently addresses the access control challenges associated with sensitive data stored in the cloud using immutability and built-in autonomy properties of the blockchain. Our system is based on a permissioned blockchain which allows access to only invited, and hence verified users. As a result of this design, further accountability is guaranteed as all users are already known and a log of their actions is kept by the blockchain. The system permits users to request data from the shared pool after their identities and cryptographic keys are verified. The evidence from the system evaluation shows that our scheme is lightweight, scalable, and efficient. Full article
(This article belongs to the Special Issue Secure Data Storage and Sharing Techniques in Cloud Computing)
Show Figures

Figure 1

798 KiB  
Article
Continuous Leakage Resilient Lossy Trapdoor Functions
by Sujuan Li, Yi Mu, Mingwu Zhang and Futai Zhang
Information 2017, 8(2), 38; https://doi.org/10.3390/info8020038 - 23 Mar 2017
Cited by 5 | Viewed by 4013
Abstract
Lossy trapdoor functions (LTFs) were first introduced by Peikert and Waters (STOC’08). Since their introduction, lossy trapdoor functions have found numerous applications. They can be used as tools to construct important cryptographic primitives such as injective one-way trapdoor functions, chosen-ciphertext-secure public key encryptions, [...] Read more.
Lossy trapdoor functions (LTFs) were first introduced by Peikert and Waters (STOC’08). Since their introduction, lossy trapdoor functions have found numerous applications. They can be used as tools to construct important cryptographic primitives such as injective one-way trapdoor functions, chosen-ciphertext-secure public key encryptions, deterministic encryptions, et al. In this paper, we focus on the lossy trapdoor functions in the presence of continuous leakage. We introduce the new notion of updatable lossy trapdoor functions (ULTFs) and give their formal definition and security properties. Based on these, we extend the security model to the LTFs against continuous leakage when the evaluation algorithm is leakage resilient. Under the standard DDH assumption and DCR assumption, respectively, we show two explicit lossy trapdoor functions against continuous leakage in the standard model. In these schemes, using the technology of matrix kernel, the trapdoor can be refreshed at regular intervals and the adversaries can learn unbounded leakage information on the trapdoor along the whole system life. At the same time, we also show the performance of the proposed schemes compared with the known existing continuous leakage resilient lossy trapdoor functions. Full article
(This article belongs to the Special Issue Secure Data Storage and Sharing Techniques in Cloud Computing)
Back to TopTop