(from : 1 )
Background
Idea
Fig. 5.4.3/1: Example from : 1
Policy Reneval
Important is that the old policy will always be revoked first before the new policy is revoked. If the new policy is revoked first, then the file version that is protected with the old policy may still be accessible when the control keys of the old policy are compromised, meaning that the file is not assuredly deleted. A straightforward approach of implementing policy renewal is to combine the file upload and download operations, but without retrieving the encrypted file from the cloud.
The procedures can be summarized as follows:
Results presented by the authors in : 1 show that overhead caused by using FADE is not significant.
The results of the experiments are presented below.
Experiment 1. Performance of upload/download operations
File size Total time Data transmision AES+HMAC Key managment File (%) Policy (%) Time (%) Time (%) 1KB 1.260s 0.724s 57.4% 0.537s 42.6% 0.000s 0.0% 0.000s 0.0% 10KB 1.552s 1.020s 65.7% 0.532s 34.3% 0.001s 0.0% 0.000s 0.0% 100KB 2.452s 1.903s 77.6% 0.546s 22.3% 0.002s 0.1% 0.001s 0.0% 1MB 4.194s 3.646s 86.9% 0.527s 12.6% 0.022s 0.5% 0.000s 0.0% 10MB 16.275s 15.463s 95.0% 0.595s 3.7% 0.218s 1.3% 0.000s 0.0%
File size Total time Data transmision AES+HMAC Key managment File (%) Policy (%) Time (%) Time (%) 1KB 0.843s 0.485s 57.5% 0.355s 42.1% 0.000s 0.0% 0.003s 0.4% 10KB 0.912s 0.615s 67.4% 0.294s 32.2% 0.000s 0.0% 0.003s 0.3% 100KB 1.968s 1.682s 85.5% 0.282s 14.3% 0.002s 0.1% 0.002s 0.1% 1MB 4.696s 4.360s 92.8% 0.317s 6.7% 0.017s 0.4% 0.002s 0.1% 10MB 33.746s 33.182s 98.3% 0.395s 1.2% 0.166s 0.5% 0.002s 0.0%
Experiment 2. Performance of policy updates
We do not show the AES+HMAC time as it is not involved in policy renewal.
File size Total time Data transmision Key managment Download (%) Upload (%) Time (%) 1KB 0.923s 0.315s 34.1% 0.605s 65.5% 0.004s 0.4% 10KB 0.805s 0.266s 33.0% 0.536s 66.6% 0.004s 0.4% 100KB 0.821s 0.271s 33.0% 0.546s 66.5% 0.004s 0.5% 1MB 0.813s 0.273s 33.5% 0.537s 66.0% 0.003s 0.4% 10MB 0.832s 0.266s 32.0% 0.562s 67.6% 0.004s 0.5%
Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: Secure overlay cloud storage with access control and assured deletion.
IEEE Trans. Dependable Secur. Comput. 9(6) (2012) 903-916. http://dx.doi.org/10.1109/TDSC.2012.49