Cloud Auditing Scheme with Dynamic Revocation of Users and Real-time Updates of Data

被引:0
作者
Han J. [1 ]
Li Y.-P. [1 ]
Yu Y. [2 ]
Ding Y. [3 ]
机构
[1] School of Mathematics and Information Science, Shaanxi Normal University, Xi'an
[2] School of Computer Science, Shaanxi Normal University, Xi'an
[3] Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin
来源
Ruan Jian Xue Bao/Journal of Software | 2020年 / 31卷 / 02期
基金
中国国家自然科学基金;
关键词
Cloud auditing; Data integrity; Dynamic revocation of users; Lightweight; Privacy protection; Virtual index;
D O I
10.13328/j.cnki.jos.005633
中图分类号
学科分类号
摘要
With the advent of cloud storage, more and more users choose to store large amounts of data on the remote cloud server in order to save local storage resources. In recent years, how to verify the integrity of remote stored data in the cloud has been become a hotspot in academia. Although many cloud auditing protocols have been put forward, most of them are based on the assumption that users (individuals or enterprises) and their public/private keys remain constant in the whole process of using cloud storage system, and these schemes cannot dynamically update data in real time. Therefore, this study proposes a lightweight cloud auditing scheme which supports dynamic revocation of users and real-time updating of data. First of all, this scheme allows users to revoke dynamically and efficiently (including the updating of public private keys), multi-use unidirectional proxy re-signature technology is adopted in the stage of revocation, that is, a new user simply needs to calculate the re-signature key instead of downloading data from the cloud to re-sign and then uploading it to the cloud. Secondly, this scheme can realize the data dynamic updating (inserting, deleting, and modifying) in real time by introducing the virtual index into the identification code of data block. Consequently, only the identification code of updated data block changes while the other's remain unchanged when dynamically updating data. Finally, in the stage of re-signature, the cloud server is able to represent a new user to re-sign, and in the stage of auditing, third party audit center can represent the current user to verify the integrity of data in the cloud, which greatly reduce the computational overhead of user and communication overhead of system (lightweight). The security and performance analyses of this study further show that the proposed scheme is secure and efficient. © Copyright 2020, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:578 / 596
页数:18
相关论文
共 27 条
[1]  
Li N.H., Li T.C., Venkatasubramanian S., t-closeness: Privacy beyond k-anonymity and l-diversity, Proc. of the IEEE 23rd Int'l Conf. on Data Engineering (ICDE 2007), pp. 106-115, (2007)
[2]  
Machanavajjhala A., Gehrke J., Kifer D., Venkitasubramaniam M., l-diversity: Privacy beyond k-anonymity, Proc. of the IEEE 22nd Int'l Conf. on Data Engineering (ICDE 2006), pp. 34-36, (2006)
[3]  
Han J., Li Y.P., Chen W.F., A lightweight and privacy-preserving public cloud auditing scheme without bilinear paring in smart cities, Computer Standards & Interfaces, 62, 1, pp. 84-97, (2019)
[4]  
Tan S., Jia Y., Han W.H., Research and development of provable data integrity in cloud storage, Chinese Journal of Computers, 38, 1, pp. 164-177, (2015)
[5]  
Ateniese G., Burns R., Curtmola R., Herring J., Kissner L., Peterson Z., Song D., Provable data possession at untrusted stores, Proc. of the 14th ACM Conf. on Computer and Communications Security (CCS 2007), pp. 598-609, (2007)
[6]  
Ristenpart T., Tromer E., Shacham H., Savage S., Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proc. of the 16th ACM Conf. on Computer and Communications Security (CCS 2009), pp. 199-212, (2009)
[7]  
Wang Q., Wang C., Ren K., Lou W.J., Li J., Enabling public verifiability and data dynamics for storage security in cloud computing, IEEE Trans. on Parallel and Distributed Systems, 22, 5, pp. 847-859, (2011)
[8]  
Wang C., Wang Q., Ren K., Lou W.J., Privacy-preserving public auditing for data storage security in cloud computing, Proc. of the IEEE INFOCOM 2010, pp. 1-9, (2010)
[9]  
Wang C., Chow S.S.M., Wang Q., Ren K., Lou W.J., Privacy-preserving public auditing for secure cloud storage, IEEE Trans. on Computers, 62, 2, pp. 362-375, (2013)
[10]  
Zhu Y., Hu H.X., Ahn G.J., Yu M.Y., Cooperative provable data possession for integrity verification in multicloud storage, IEEE Trans. on Parallel and Distributed Systems, 23, 12, pp. 2231-2244, (2012)