Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage

被引:1
作者
Zhao, Xia'nan [1 ]
Wang, Dongsheng [2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Peoples R China
[2] Acad Mil Sci, Def Innovat Inst, Beijing, Peoples R China
来源
2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022) | 2022年
关键词
Cloud computing; Data integrity; Public; Auditing; Privacy-preserving; Multilinear maps;
D O I
10.1109/SEC54971.2022.00074
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the mobile cloud storage services, mobile users can easily form a group and share data with each other. Given the fact that the cloud are not trustable, a third party public auditor can be introduced to audit data integrity, and supporting group dynamics and protecting the privacy of the original user of shared data from the public auditor is a fundamental issue during the auditing. In this paper, we propose a new identity privacy preserving public auditing scheme for the integrity of group data with efficient group dynamics utilizing the multilinear maps based Diffie-Hellman Key Exchange protocol. With our proposed scheme, a third party auditor is able to audit the integrity of shared data without learning private identity information of the group members, and proxy re-signatures are used here to allow the cloud to do the re-computing to support group dynamics (user join and user revocation). Besides, our scheme also supports secure and efficient public auditing due to our improved polynomial-based authentication tags. The security and performance analysis shows that our proposed scheme is secure and highly efficient.
引用
收藏
页码:486 / 491
页数:6
相关论文
共 22 条
[1]  
Ateniese G., 2005, P 12 ACM C COMP COMM, P310, DOI DOI 10.1145/1102120.1102161
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]  
Bowers K.D., 2009, Workshop on Cloud computing Security (CCSW), P43, DOI DOI 10.1145/1655008.1655015
[4]  
Boyang Wang, 2013, 2013 IEEE International Conference on Communications (ICC), P1946, DOI 10.1109/ICC.2013.6654808
[5]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[6]  
Cachin Christian, 2009, SIGACT News, V40, P81, DOI 10.1145/1556154.1556173
[7]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[8]   Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates [J].
Liu, Chang ;
Chen, Jinjun ;
Yang, Laurence T. ;
Zhang, Xuyun ;
Yang, Chi ;
Ranjan, Rajiv ;
Kotagiri, Ramamohanarao .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2234-2244
[9]   Security Challenges for the Public Cloud [J].
Ren, Kui ;
Wang, Cong ;
Wang, Qian .
IEEE INTERNET COMPUTING, 2012, 16 (01) :69-73
[10]   Public auditing for shared cloud data with efficient and secure group management [J].
Tian, Hui ;
Nan, Fulin ;
Jiang, Hong ;
Chang, Chin-Chen ;
Ning, Jianting ;
Huang, Yongfeng .
INFORMATION SCIENCES, 2019, 472 :107-125