Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data

被引:47
作者
Gao, Xiang [1 ,2 ]
Yu, Jia [1 ,2 ]
Chang, Yan [3 ,4 ]
Wang, Huaqun [5 ]
Fan, Jianxi [6 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Chengdu Univ Informat Technol, Sch Cybersecur, Chengdu 610225, Peoples R China
[4] Adv Cryptog & Syst Secur Key Lab Sichuan Prov, Chengdu 610000, Peoples R China
[5] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Jiangsu, Peoples R China
[6] Soochow Univ, Sch Comp Sci & Technol, Suzhou 215006, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Cloud computing; Indexes; Security; Privacy; Data privacy; Task analysis; Cloud storage; sensitive information privacy; keyword search; data auditing; privacy; SHARED DATA; SEARCH; SECURE; SQL;
D O I
10.1109/TDSC.2021.3106780
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The public cloud data integrity auditing technique is used to check the integrity of cloud data through the Third Party Auditor (TPA). In order to make it more practical, we propose a new paradigm called integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data. This paradigm is designed for one of the most common scenario, that is, the user concerns the integrity of a portion of encrypted cloud files that contain his/her interested keywords. In our proposed scheme, the TPA who is only provided with the encrypted keyword, can audit the integrity of all encrypted cloud files that contain the user's interested keyword. Meanwhile, the TPA cannot deduce the sensitive information about which files contain the keyword and how many files contain this keyword. These salient features are realized by leveraging a newly proposed Relation Authentication Label (RAL). The RAL can not only authenticate the relation that files contain the queried keyword, but also be used to generate the auditing proof without sensitive information exposure. We give concrete security analysis showing that the proposed scheme satisfies correctness, auditing soundness and sensitive information privacy. We also conduct the detailed experiments to show the efficiency of our scheme.
引用
收藏
页码:3774 / 3789
页数:16
相关论文
共 22 条
[21]   Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property [J].
Ji, Yanyan ;
Shao, Bilin ;
Chang, Jinyong ;
Bian, Genqing .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01) :337-349
[22]   Identity-Based Integrity Auditing Scheme With Sensitive Information Hiding for Proxy-Server-Assisted Cloud Storage Applications [J].
Hu, Xinran ;
Chang, Jinyong ;
Ahmad, Tanvir ;
Zhang, Funing ;
Zhang, Yuchen .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06) :6673-6684