Wider adoption of cloud storage services by organizations has been hindered by security and privacy issues. A consequence of storing data on the cloud is that, by its very nature, the storage infrastructure is not owned by the same organization that owns the data.
In addition, the data of one user is stored along with that of many others. Traditional schemes for ensuring security can only protect data privacy by sacrificing convenient operations such as searching and sharing.
Now, Shu Qin Ren and his colleague Khin Mi Mi Aung at the A*STAR Data Storage Institute in Singapore have devised a scheme that would not only allow organizations to store data on the cloud without loss of privacy but also permit searching and sharing of the data1. The system is able to preserve the benefit of the cloud’s specialized low-cost storage infrastructure while overcoming its current privacy and flexibility limitations. “The scheme may potentially push forward the wider adoption of cloud storage usage for organizations,” says Ren.
The solution proposed by the researchers involves a central ‘key manager’, who specifically manages data authentication and access authorization. In their scheme, data stored on the cloud is encrypted by its owner and hence is indecipherable to anyone else — including the cloud storage provider. A secret key required to unlock the encryption is generated and kept by the owner, who also determines an access policy for other users. This policy is implemented by the key manager, who generates a second access key, which is then passed back to the owner. Next, the owner wraps the original encryption key in this second layer of protection. The key manager is then able to pass on the second ‘public’ key to authorized third parties to allow them to access the data.
Under traditional privacy schemes, the owner manages both the encryption of and access to their data. Sharing with a third party typically involves retrieval and decryption of the data by the owner and therefore some loss of privacy. Under Ren and Aung’s scheme — entitled ‘Privacy Preserved Data Sharing’ — the third party only deals with the key manager and, after authorization, receives the public key without interacting with the data’s owner, thus allowing privacy to be maintained.
“The research team is now building a secure data searching and sharing prototype to test on structured data such as in databases,” says Ren. “The next step is to support unstructured data.”
The A*STAR-affiliated researchers contributing to this research are from the Data Storage Institute
Ren, S. Q. & Aung, K. M. M. PPDS: Privacy Preserved Data Sharing scheme for cloud storage. International Journal of Advancements in Computing Technology 4, 493–499 (2012).
Japanese researchers develop ultrathin, highly elastic skin display
19.02.2018 | University of Tokyo
Why bees soared and slime flopped as inspirations for systems engineering
19.02.2018 | Georgia Institute of Technology
For the first time, a team of researchers at the Max-Planck Institute (MPI) for Polymer Research in Mainz, Germany, has succeeded in making an integrated circuit (IC) from just a monolayer of a semiconducting polymer via a bottom-up, self-assembly approach.
In the self-assembly process, the semiconducting polymer arranges itself into an ordered monolayer in a transistor. The transistors are binary switches used...
Breakthrough provides a new concept of the design of molecular motors, sensors and electricity generators at nanoscale
Researchers from the Institute of Organic Chemistry and Biochemistry of the CAS (IOCB Prague), Institute of Physics of the CAS (IP CAS) and Palacký University...
For photographers and scientists, lenses are lifesavers. They reflect and refract light, making possible the imaging systems that drive discovery through the microscope and preserve history through cameras.
But today's glass-based lenses are bulky and resist miniaturization. Next-generation technologies, such as ultrathin cameras or tiny microscopes, require...
Scientists from the University of Zurich have succeeded for the first time in tracking individual stem cells and their neuronal progeny over months within the intact adult brain. This study sheds light on how new neurons are produced throughout life.
The generation of new nerve cells was once thought to taper off at the end of embryonic development. However, recent research has shown that the adult brain...
Theoretical physicists propose to use negative interference to control heat flow in quantum devices. Study published in Physical Review Letters
Quantum computer parts are sensitive and need to be cooled to very low temperatures. Their tiny size makes them particularly susceptible to a temperature...
15.02.2018 | Event News
13.02.2018 | Event News
12.02.2018 | Event News
21.02.2018 | Life Sciences
21.02.2018 | Life Sciences
21.02.2018 | Materials Sciences