Wider adoption of cloud storage services by organizations has been hindered by security and privacy issues. A consequence of storing data on the cloud is that, by its very nature, the storage infrastructure is not owned by the same organization that owns the data.
In addition, the data of one user is stored along with that of many others. Traditional schemes for ensuring security can only protect data privacy by sacrificing convenient operations such as searching and sharing.
Now, Shu Qin Ren and his colleague Khin Mi Mi Aung at the A*STAR Data Storage Institute in Singapore have devised a scheme that would not only allow organizations to store data on the cloud without loss of privacy but also permit searching and sharing of the data1. The system is able to preserve the benefit of the cloud’s specialized low-cost storage infrastructure while overcoming its current privacy and flexibility limitations. “The scheme may potentially push forward the wider adoption of cloud storage usage for organizations,” says Ren.
The solution proposed by the researchers involves a central ‘key manager’, who specifically manages data authentication and access authorization. In their scheme, data stored on the cloud is encrypted by its owner and hence is indecipherable to anyone else — including the cloud storage provider. A secret key required to unlock the encryption is generated and kept by the owner, who also determines an access policy for other users. This policy is implemented by the key manager, who generates a second access key, which is then passed back to the owner. Next, the owner wraps the original encryption key in this second layer of protection. The key manager is then able to pass on the second ‘public’ key to authorized third parties to allow them to access the data.
Under traditional privacy schemes, the owner manages both the encryption of and access to their data. Sharing with a third party typically involves retrieval and decryption of the data by the owner and therefore some loss of privacy. Under Ren and Aung’s scheme — entitled ‘Privacy Preserved Data Sharing’ — the third party only deals with the key manager and, after authorization, receives the public key without interacting with the data’s owner, thus allowing privacy to be maintained.
“The research team is now building a secure data searching and sharing prototype to test on structured data such as in databases,” says Ren. “The next step is to support unstructured data.”
The A*STAR-affiliated researchers contributing to this research are from the Data Storage Institute
Ren, S. Q. & Aung, K. M. M. PPDS: Privacy Preserved Data Sharing scheme for cloud storage. International Journal of Advancements in Computing Technology 4, 493–499 (2012).
Metamolds: Molding a mold
20.08.2018 | Institute of Science and Technology Austria
Robots as Tools and Partners in Rehabilitation
17.08.2018 | Albert-Ludwigs-Universität Freiburg im Breisgau
There are currently great hopes for solid-state batteries. They contain no liquid parts that could leak or catch fire. For this reason, they do not require cooling and are considered to be much safer, more reliable, and longer lasting than traditional lithium-ion batteries. Jülich scientists have now introduced a new concept that allows currents up to ten times greater during charging and discharging than previously described in the literature. The improvement was achieved by a “clever” choice of materials with a focus on consistently good compatibility. All components were made from phosphate compounds, which are well matched both chemically and mechanically.
The low current is considered one of the biggest hurdles in the development of solid-state batteries. It is the reason why the batteries take a relatively long...
New design tool automatically creates nanostructure 3D-print templates for user-given colors
Scientists present work at prestigious SIGGRAPH conference
Most of the objects we see are colored by pigments, but using pigments has disadvantages: such colors can fade, industrial pigments are often toxic, and...
Scientists at the University of California, Los Angeles present new research on a curious cosmic phenomenon known as "whistlers" -- very low frequency packets...
Scientists develop first tool to use machine learning methods to compute flow around interactively designable 3D objects. Tool will be presented at this year’s prestigious SIGGRAPH conference.
When engineers or designers want to test the aerodynamic properties of the newly designed shape of a car, airplane, or other object, they would normally model...
Researchers from TU Graz and their industry partners have unveiled a world first: the prototype of a robot-controlled, high-speed combined charging system (CCS) for electric vehicles that enables series charging of cars in various parking positions.
Global demand for electric vehicles is forecast to rise sharply: by 2025, the number of new vehicle registrations is expected to reach 25 million per year....
17.08.2018 | Event News
08.08.2018 | Event News
27.07.2018 | Event News
20.08.2018 | Life Sciences
20.08.2018 | Information Technology
20.08.2018 | Power and Electrical Engineering