Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding

被引:9
作者
Fan, Yu [1 ]
Liao, Yongjian [1 ]
Li, Fagen [2 ]
Zhou, Shijie [1 ]
Zhang, Ganglin [1 ]
机构
[1] Univ ER Iron Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China
关键词
Cloud computing; shared cloud data; remote auditing; sensitive information hiding; malicious manager preventing; DATA POSSESSION SCHEME; BIG DATA-STORAGE; ENCRYPTION SCHEME; USER REVOCATION; PRIVACY; PROTOCOL;
D O I
10.1109/ACCESS.2019.2932430
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of cloud computing arouses the flourish of data sharing, promoting the development of research, especially in the fields of data analysis, artificial intelligence, etc. In order to address sensitive information hiding, auditing shared data efficiently and malicious manager preventing, we propose an identity-based auditing scheme for shared cloud data with a secure mechanism to hide sensitive information. This scheme provides a solution that allows users to share plaintext with researchers and keeps sensitive information invisible to the cloud and researchers at the same time. Besides, a formal security analysis is given to prove the strong security of the proposed scheme. Performance evaluation and experimental results demonstrate that our scheme is significantly more efficient over the existing scheme due to our novel mechanism for sensitive information hiding and simplifying signature algorithm. Compared to the existing approach to audit the integrity of shared data with sensitive information hiding, our scheme has desirable features and advantages as follow. Firstly, previous work has failed to construct a secure scheme to prevent malicious manager. We fill this gap and guarantee the integrity and authenticity of shared data. Secondly, our scheme constructs a novel system model to support high concurrency and massive data in the real scenario.
引用
收藏
页码:114246 / 114260
页数:15
相关论文
共 45 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] [Anonymous], 2017, P ACM AUST COMP SCI
  • [3] Ateniese G, 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
  • [4] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [5] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [6] A Remote Data Integrity Checking Scheme for Big Data Storage
    Chen, Xingyue
    Shang, Tao
    Kim, Ilryong
    Liu, Jianwei
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 53 - 59
  • [7] Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
  • [8] An Efficient Lucas Sequence-Based Batch Auditing Scheme for the Internet of Medical Things
    Han, Jing
    Li, Yanping
    Liu, Jianqing
    Zhao, Minghao
    [J]. IEEE ACCESS, 2019, 7 : 10077 - 10092
  • [9] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud
    He, Debiao
    Kumar, Neeraj
    Wang, Huaqun
    Wang, Lina
    Choo, Kim-Kwang Raymond
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2017, 314 : 31 - 43
  • [10] Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
    He, Debiao
    Zeadally, Sherali
    Wu, Libing
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (01): : 64 - 73