Authors: Zhiying Wang; Jun Ye; Jianfeng Wang
Addresses: State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xian 710071, China ' State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xian 710071, China ' State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xian 710071, China; Guangxi Cooperative Innovation Center of Cloud Computing and Big Data, Guilin University of Electronic Technology, Guilin 541004, China
Abstract: Owing to the convenience of mobile devices and the advantages of cloud computing, it is a fashion to efficiently share data by mobile devices in cloud computing. However, it might be insecure to upload the plaintext directly to the remote cloud server. In order to solve the problem, the data should be encrypted by a secure encryption scheme. Most existing data sharing schemes in cloud computing are either insecure against collusion attack or suffer from a large computational overhead. In this paper, an efficient data sharing scheme in cloud computing for mobile devices is proposed based on convergent encryption and polynomial reconstruction techniques. Moreover, predecryption is used to further reduce the computation overhead of mobile devices. Finally, we utilise traitor tracing technology to track the users who have leaked private keys for their own benefit. Experimental results indicate that the proposed scheme is extremely suitable for mobile devices.
Keywords: data sharing; mobile cloud computing; convergent encryption; polynomial reconstruction; traitor tracing.
International Journal of High Performance Computing and Networking, 2018 Vol.12 No.2, pp.156 - 165
Available online: 22 Aug 2018 *Full-text access for editors Access for subscribers Purchase this article Comment on this article