Title: A secure access and associate deleting scheme for multi-replica in multi-cloud environment

Authors: Jinbo Xiong; Suping Li; Xuan Li; Yuanyuan Zhang; Biao Jin

Addresses: Faculty of Software, Fujian Normal University, Fuzhou, China; Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China ' Faculty of Software, Fujian Normal University, Fuzhou, China; Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China ' Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou, China ' Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou, China ' Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou, China

Abstract: With the rapid development of cloud services in multi-cloud environment, it is convenient to generate multi-replica for user's data stored in multi-cloud servers. On the one hand, multi-replica is able to improve data availability and users' experience. But on the other hand, it becomes increasingly easy to disclose sensitive data and brings serious challenges to security and privacy for user's data and its multi-replica. In order to tackle the above issues, in this paper, we propose a secure access and associate deleting scheme for multi-replica (MADS) in multi-cloud environment, which is based on symmetric encryption algorithm, attribute-based encryption and replica location technology. We construct a novel multi-layered key structure, called multi-way search key tree (MSKT) that ensures no key material will be revealed, yet the data owner is able to control the master key and manage other keys by performing some tree operations. We also propose a data replica associated model, which is able to associate all he data replicas in multi-cloud environment. Comprehensive comparison and security analysis demonstrate that the proposed MADS scheme is effective and secure.

Keywords: secure access; associate deleting; privacy protection; multi-replica; assured deletion; multi-cloud environment; cloud computing; access security; privacy preservation; cloud services; cloud security; symmetric encryption; cryptography; attribute-based encryption; ABE; replica location technology; key management.

DOI: 10.1504/IJHPSA.2016.080665

International Journal of High Performance Systems Architecture, 2016 Vol.6 No.3, pp.143 - 152

Available online: 27 Nov 2016 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article