Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computation allows the users with limited computing power outsource their data to the cloud of large-scale computing power through payment method. However, the security issue has been always the obstacles to the widely use of the computing outsourcing, especially when the end-user's privacy data need to be processed on the cloud. Secure outsourcing mechanisms are in great need to not only protect privacy information, but also protect customers from malicious behaviors by validating the computation result. A mechanism of general secure computation outsourcing was recently shown to be feasible in theory, but to design mechanisms that are practically efficient is a very challenging problem. General research is based on a basic model. The model we used in this paper including Data Owner (DO), Cloud Service Provider (CSP) and End-User (EU). Focus on considering the DO, CSP and EU. Over-encryption is a good method to protect the security of the users' data. Our proposal is based on the application of selective encryption as a means to enforce authorizations. Two layers of encryption are imposed on the data blocks. This paper talks about the over-encryption mechanism and proposes a novel over-encryption mechanism which can protect the security of the data on the Cloud. Last, we do some experiments to verify the performance of our mechanism. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Rao, B., Zhou, Z., Zhang, H., Tang, S., & Yao, R. (2013). Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption. In Communications in Computer and Information Science (Vol. 320, pp. 109–116). Springer Verlag. https://doi.org/10.1007/978-3-642-35795-4_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free