Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data

被引:144
作者
Zhang, Yue [1 ]
Yu, Jia [1 ,2 ]
Hao, Rong [1 ]
Wang, Cong [3 ]
Ren, Kui [4 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[4] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
基金
中国国家自然科学基金;
关键词
Cloud computing; Data integrity; Computer science; Data privacy; Computational modeling; Public key; cloud storage auditing; user revocation; big data; identity-based cryptography; DATA POSSESSION CHECKING; PRIVACY;
D O I
10.1109/TDSC.2018.2829880
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage auditing schemes for shared data refer to checking the integrity of cloud data shared by a group of users. User revocation is commonly supported in such schemes, as users may be subject to group membership changes for various reasons. Previously, the computational overhead for user revocation in such schemes is linear with the total number of file blocks possessed by a revoked user. The overhead, however, may become a heavy burden because of the sheer amount of the shared cloud data. Thus, how to reduce the computational overhead caused by user revocations becomes a key research challenge for achieving practical cloud data auditing. In this paper, we propose a novel storage auditing scheme that achieves highly-efficient user revocation independent of the total number of file blocks possessed by the revoked user in the cloud. This is achieved by exploring a novel strategy for key generation and a new private key update technique. Using this strategy and the technique, we realize user revocation by just updating the non-revoked group users' private keys rather than authenticators of the revoked user. The integrity auditing of the revoked user's data can still be correctly performed when the authenticators are not updated. Meanwhile, the proposed scheme is based on identity-base cryptography, which eliminates the complicated certificate management in traditional Public Key Infrastructure (PKI) systems. The security and efficiency of the proposed scheme are validated via both analysis and experimental results.
引用
收藏
页码:608 / 619
页数:12
相关论文
共 37 条
  • [1] [Anonymous], 2013, P INT WORKSH SEC CLO, DOI DOI 10.1145/2484402.2484408
  • [2] [Anonymous], [No title captured]
  • [3] Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
  • [4] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [5] Bowers K.D., 2009, Workshop on Cloud computing Security (CCSW), P43, DOI DOI 10.1145/1655008.1655015
  • [6] Cash D, 2013, LECT NOTES COMPUT SC, V7881, P279, DOI 10.1007/978-3-642-38348-9_17
  • [7] Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
    Jiang, Tao
    Chen, Xiaofeng
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2363 - 2373
  • [8] Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
  • [9] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [10] Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation
    Luo, Yuchuan
    Xu, Ming
    Fu, Shaojing
    Wang, Dongsheng
    Deng, Junquan
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 434 - 442