NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users

被引:88
作者
Fu, Anmin [1 ]
Yu, Shui [2 ]
Zhang, Yuqing [3 ]
Wang, Huaqun [4 ]
Huang, Chanying [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210000, Jiangsu, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3012, Australia
[3] UCAS, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
[4] Nangjing Univ Posts & Telecommun, Sch Comp Sci, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing, Peoples R China
基金
国家重点研发计划; 美国国家科学基金会;
关键词
Data integrity; homomorphic verifiable; non-frameability; provable security; SHARED DATA; REVOCATION; STORAGE;
D O I
10.1109/TBDATA.2017.2701347
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, cloud storage becomes one of the critical services, because users can easily modify and share data with others in cloud. However, the integrity of shared cloud data is vulnerable to inevitable hardware faults, software failures or human errors. To ensure the integrity of the shared data, some schemes have been designed to allow public verifiers (i.e., third party auditors) to efficiently audit data integrity without retrieving the entire users' data from cloud. Unfortunately, public auditing on the integrity of shared data may reveal data owners' sensitive information to the third party auditor. In this paper, we propose a new privacy-aware public auditing mechanism for shared cloud data by constructing a homomorphic verifiable group signature. Unlike the existing solutions, our scheme requires at least t group managers to recover a trace key cooperatively, which eliminates the abuse of single-authority power and provides non-frameability. Moreover, our scheme ensures that group users can trace data changes through designated binary tree; and can recover the latest correct data block when the current data block is damaged. In addition, the formal security analysis and experimental results indicate that our scheme is provably secure and efficient.
引用
收藏
页码:14 / 24
页数:11
相关论文
共 27 条
[11]  
Wang, 2012, Proc. 10th Intl Conf. Applied Cryptography and Network Security, P507, DOI DOI 10.1007/978-3-642-31284-7_30
[12]   Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud [J].
Wang, Boyang ;
Li, Baochun ;
Li, Hui .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (01) :92-106
[13]  
Wang BY, 2013, IEEE INFOCOM SER, P2904
[14]  
Wang BY, 2014, IEEE T CLOUD COMPUT, V2, P43, DOI [10.1109/TCC.2014.2299807, 10.1109/CLOUD.2012.46]
[15]  
Wang DH, 2010, IEEE PEDG 2010: THE 2ND INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS FOR DISTRIBUTED GENERATION SYSTEMS, P1, DOI 10.1109/PEDG.2010.5545769
[16]   Identity-Based Distributed Provable Data Possession in Multicloud Storage [J].
Wang, Huaqun .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (02) :328-340
[17]   Proxy Provable Data Possession in Public Clouds [J].
Wang, Huaqun .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2013, 6 (04) :551-559
[18]   On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage [J].
Wang, Huaqun ;
Zhang, Yuqing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :264-267
[19]   Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing [J].
Wang, Qian ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing ;
Li, Jin .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (05) :847-859
[20]  
Wei-Fu Hsien, 2016, International Journal of Network Security, V18, P133