Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data

被引:44
作者
Gao, Xiang [1 ,2 ]
Yu, Jia [1 ,2 ]
Chang, Yan [3 ,4 ]
Wang, Huaqun [5 ]
Fan, Jianxi [6 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Chengdu Univ Informat Technol, Sch Cybersecur, Chengdu 610225, Peoples R China
[4] Adv Cryptog & Syst Secur Key Lab Sichuan Prov, Chengdu 610000, Peoples R China
[5] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Jiangsu, Peoples R China
[6] Soochow Univ, Sch Comp Sci & Technol, Suzhou 215006, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Cloud computing; Indexes; Security; Privacy; Data privacy; Task analysis; Cloud storage; sensitive information privacy; keyword search; data auditing; privacy; SHARED DATA; SEARCH; SECURE; SQL;
D O I
10.1109/TDSC.2021.3106780
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The public cloud data integrity auditing technique is used to check the integrity of cloud data through the Third Party Auditor (TPA). In order to make it more practical, we propose a new paradigm called integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data. This paradigm is designed for one of the most common scenario, that is, the user concerns the integrity of a portion of encrypted cloud files that contain his/her interested keywords. In our proposed scheme, the TPA who is only provided with the encrypted keyword, can audit the integrity of all encrypted cloud files that contain the user's interested keyword. Meanwhile, the TPA cannot deduce the sensitive information about which files contain the keyword and how many files contain this keyword. These salient features are realized by leveraging a newly proposed Relation Authentication Label (RAL). The RAL can not only authenticate the relation that files contain the queried keyword, but also be used to generate the auditing proof without sensitive information exposure. We give concrete security analysis showing that the proposed scheme satisfies correctness, auditing soundness and sensitive information privacy. We also conduct the detailed experiments to show the efficiency of our scheme.
引用
收藏
页码:3774 / 3789
页数:16
相关论文
共 21 条
  • [1] Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 331 - 346
  • [2] Privacy-Preserving Bloom Filter-Based Keyword Search Over Large Encrypted Cloud Data
    Liang, Yanrong
    Ma, Jianfeng
    Miao, Yinbin
    Kuang, Da
    Meng, Xiangdong
    Deng, Robert H.
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (11) : 3086 - 3098
  • [3] Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving
    Yan, Hao
    Gui, Wenming
    IEEE ACCESS, 2021, 9 (09): : 45822 - 45831
  • [4] Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 577 - 585
  • [5] Cloud data integrity checking with an identity-based auditing mechanism from RSA
    Yu, Yong
    Xue, Liang
    Au, Man Ho
    Susilo, Willy
    Ni, Jianbing
    Zhang, Yafang
    Vasilakos, Athanasios V.
    Shen, Jian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 85 - 91
  • [6] Certificateless Remote Data Integrity Auditing with Access Control of Sensitive Information in Cloud Storage
    Bian, Genqing
    Zhang, Fan
    Li, Rong
    Shao, Bilin
    ELECTRONICS, 2022, 11 (19)
  • [7] ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification
    Kang, Baoyuan
    Si, Lin
    Jiang, Hong
    Li, Chunqing
    Xie, Mingming
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding
    Fan, Yu
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    Zhang, Ganglin
    IEEE ACCESS, 2019, 7 : 114246 - 114260
  • [9] Privacy-Preserving Keyword-based Semantic Search over Encrypted Cloud Data
    Sun, Xingming
    Zhu, Yanling
    Xia, Zhihua
    Chen, Lihong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 9 - 20
  • [10] Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10434 - 10445