Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing

被引:1
作者
Zhao, Pu [1 ]
Yu, Jia [1 ,2 ]
Zhang, Hanlin [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Shandong, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
public auditing; cloud storage; secure outsourcing; modular exponentiation; cloud computing;
D O I
10.6688/JISE.201905_35(3).0009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public cloud storage auditing allows a file owner or a public verifier to conduct integrity checking without downloading the whole file from cloud server. Plenty of unaffordable modular exponentiations for resource-constraint devices are required on the client side in the process of signature generation for public cloud storage auditing. In this paper, we introduce a secure outsourcing algorithm to make cloud storage public auditing more feasible and practical for the computationally limited clients. Compared with the existing algorithms for secure outsourcing of modular exponentiations, the proposed algorithm designed for this scenario takes advantage of that the bases of modular exponentiations do not need to be protected. Therefore, our algorithm is efficient. Furthermore, the evaluation shows that it has high efficiency and checkability as well. Specifically, the client-side cost is reduced to 5.6% of the original computation cost, and the probability that the client detects the misbehavior of server is close to 1.
引用
收藏
页码:635 / 650
页数:16
相关论文
共 22 条
[1]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[2]  
Chaum D., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P89
[3]   New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations [J].
Chen, Xiaofeng ;
Huang, Xinyi ;
Li, Jin ;
Ma, Jianfeng ;
Lou, Wenjing ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :69-78
[4]   New Algorithms for Secure Outsourcing of Modular Exponentiations [J].
Chen, Xiaofeng ;
Li, Jin ;
Ma, Jianfeng ;
Tang, Qiang ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2386-2396
[5]   Secure outsourcing of modular exponentiations under single untrusted programme model [J].
Ding, Yong ;
Xu, Zheng ;
Ye, Jun ;
Choo, Kim-Kwang Raymond .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 :1-13
[6]  
Gennaro R, 2010, LECT NOTES COMPUT SC, V6223, P465, DOI 10.1007/978-3-642-14623-7_25
[7]  
Hohenberger S, 2005, LECT NOTES COMPUT SC, V3378, P264
[8]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[9]   Cloud Computing Service: The Case of Large Matrix Determinant Computation [J].
Lei, Xinyu ;
Liao, Xiaofeng ;
Huang, Tingwen ;
Li, Huaqing .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (05) :688-700
[10]  
Nan XF, 2010, IEEE INT C BIOINFORM, P520, DOI 10.1109/BIBM.2010.5706621