Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

被引:123
作者
Jiang, Tao [1 ]
Chen, Xiaofeng [1 ]
Ma, Jianfeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
基金
国家教育部博士点专项基金资助; 中国国家自然科学基金;
关键词
Public integrity auditing; dynamic data; victor commitment; group signature; cloud computing;
D O I
10.1109/TC.2015.2389955
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature. Recently some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. However, these schemes are still not secure against the collusion of cloud storage server and revoked group users during user revocation in practical cloud storage system. In this paper, we figure out the collusion attack in the exiting scheme and provide an efficient public integrity auditing scheme with secure group user revocation based on vector commitment and verifier-local revocation group signature. We design a concrete scheme based on the our scheme definition. Our scheme supports the public checking and efficient user revocation and also some nice properties, such as confidently, efficiency, countability and traceability of secure group user revocation. Finally, the security and experimental analysis show that, compared with its relevant schemes our scheme is also secure and efficient.
引用
收藏
页码:2363 / 2373
页数:11
相关论文
共 45 条
  • [21] Chen XF, 2014, LECT NOTES COMPUT SC, V8712, P148, DOI 10.1007/978-3-319-11203-9_9
  • [22] Cloud9, 2011, YOUR DEV ENV CLOUD
  • [23] Codeanywhere, 2011, ONL COD ED
  • [24] Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109
  • [25] Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
  • [26] eXo Cloud IDE, 2002, ONL COD ED
  • [27] Gennaro R, 2010, LECT NOTES COMPUT SC, V6223, P465, DOI 10.1007/978-3-642-14623-7_25
  • [28] Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
  • [29] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
  • [30] Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584