NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users

被引:88
作者
Fu, Anmin [1 ]
Yu, Shui [2 ]
Zhang, Yuqing [3 ]
Wang, Huaqun [4 ]
Huang, Chanying [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210000, Jiangsu, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3012, Australia
[3] UCAS, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
[4] Nangjing Univ Posts & Telecommun, Sch Comp Sci, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing, Peoples R China
基金
国家重点研发计划; 美国国家科学基金会;
关键词
Data integrity; homomorphic verifiable; non-frameability; provable security; SHARED DATA; REVOCATION; STORAGE;
D O I
10.1109/TBDATA.2017.2701347
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, cloud storage becomes one of the critical services, because users can easily modify and share data with others in cloud. However, the integrity of shared cloud data is vulnerable to inevitable hardware faults, software failures or human errors. To ensure the integrity of the shared data, some schemes have been designed to allow public verifiers (i.e., third party auditors) to efficiently audit data integrity without retrieving the entire users' data from cloud. Unfortunately, public auditing on the integrity of shared data may reveal data owners' sensitive information to the third party auditor. In this paper, we propose a new privacy-aware public auditing mechanism for shared cloud data by constructing a homomorphic verifiable group signature. Unlike the existing solutions, our scheme requires at least t group managers to recover a trace key cooperatively, which eliminates the abuse of single-authority power and provides non-frameability. Moreover, our scheme ensures that group users can trace data changes through designated binary tree; and can recover the latest correct data block when the current data block is damaged. In addition, the formal security analysis and experimental results indicate that our scheme is provably secure and efficient.
引用
收藏
页码:14 / 24
页数:11
相关论文
共 27 条
[1]  
[Anonymous], 2017, P ACM AUST COMP SCI
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]  
Boyang Wang, 2013, 2013 IEEE International Conference on Communications (ICC), P1946, DOI 10.1109/ICC.2013.6654808
[4]   Security issues in cloud environments: a survey [J].
Fernandes, Diogo A. B. ;
Soares, Liliana F. B. ;
Gomes, Joao V. ;
Freire, Mario M. ;
Inacio, Pedro R. M. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) :113-170
[5]  
[黄龙霞 Huang Longxia], 2016, [计算机研究与发展, Journal of Computer Research and Development], V53, P2334
[6]   Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation [J].
Jiang, Tao ;
Chen, Xiaofeng ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2363-2373
[7]  
Jin HM, 2009, COMM COM INF SC, V58, P124
[8]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[9]   Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates [J].
Liu, Chang ;
Chen, Jinjun ;
Yang, Laurence T. ;
Zhang, Xuyun ;
Yang, Chi ;
Ranjan, Rajiv ;
Kotagiri, Ramamohanarao .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2234-2244
[10]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613