Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud

被引:12
作者
Gan, Qingqing [1 ]
Wang, Xiaoming [1 ]
Fang, Xuefeng [1 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
dynamic auditing; algebraic signature; XOR-homomorphic function; provable security; cloud storage; DATA POSSESSION CHECKING; ALGEBRAIC SIGNATURES;
D O I
10.1007/s11432-017-9410-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Big data offers significant benefits; however, security and privacy problems must be considered, especially with regard to outsourced big data. Auditing outsourced big data is an important factor in security and privacy. However, most of the existing auditing techniques are not suitable for outsourced big data due to their high computational and communication costs at the auditor and the data owner (DO) side. In this paper, we propose an efficient auditing scheme for outsourced big data based on algebraic signatures and an XOR-homomorphic function, that can achieve numerous advantages, such as fewer challenges and proofs, non-block verification, data privacy preservation, and lower computational and communication costs. The proposed scheme enables a trusted third-party auditor, on behalf of DOs, to audit the outsourced data in a cloud. Thus, reducing the computational burden on the DOs. Subsequently, we construct a new data structure called a Record Table (RTable) and extend the basic auditing scheme to support the data dynamic operations. As our extended scheme does not use public key encryption, the entire process of updating the data incurs only a small computational and communication overhead with regard to the auditor, the DOs, and the cloud server. Finally, the proposed basic scheme is proved secure under the security model against various attacks. Analysis of the performance shows that both our basic scheme and extended scheme are highly efficient.
引用
收藏
页数:15
相关论文
共 32 条
[1]  
Ade-Ibijola A. O., 2012, Int. J. Comput. Appl., V54, P24
[2]  
Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]   Remote Data Checking Using Provable Data Possession [J].
Ateniese, Giuseppe ;
Burns, Randal ;
Curtmola, Reza ;
Herring, Joseph ;
Khan, Osama ;
Kissner, Lea ;
Peterson, Zachary ;
Song, Dawn .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
[5]  
Barsoum A. F., 2011, IACR Cryptol. ePrint Arch., V2011, P447
[6]   Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems [J].
Barsoum, Ayad ;
Hasan, Anwar .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (12) :2375-2385
[7]   Dynamic Proofs of Retrievability Via Oblivious RAM [J].
Cash, David ;
Kupcu, Alptekin ;
Wichs, Daniel .
JOURNAL OF CRYPTOLOGY, 2017, 30 (01) :22-57
[8]   Data dynamics for remote data possession checking in cloud storage [J].
Chen, Lanxiang ;
Zhou, Shuming ;
Huang, Xinyi ;
Xu, Li .
COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) :2413-2424
[9]   Using algebraic signatures to check data possession in cloud storage [J].
Chen, Lanxiang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1709-1715
[10]  
Demchenko Y., 2013, P WORKSH SEC DAT MAN, P76