Enabling public auditability for operation behaviors in cloud storage

被引:15
作者
Tian, Hui [1 ]
Chen, Zhaoyi [1 ]
Chang, Chin-Chen [2 ]
Kuribayashi, Minoru [3 ]
Huang, Yongfeng [4 ]
Cai, Yiqiao [1 ]
Chen, Yonghong [1 ]
Wang, Tian [1 ]
机构
[1] Natl Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Okayama Univ, Grad Sch Nat Sci & Technol, Okayama 7008530, Japan
[4] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
关键词
Cloud storage; Public auditing; Operation behaviors; Merkle hash tree; Secure logging; SECURITY; CHALLENGES;
D O I
10.1007/s00500-016-2311-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we focus on auditing for users' operation behaviors, which is significant for the avoidance of potential crimes in the cloud and equitable accountability determination in the forensic. We first present a public model for operation behaviors in cloud storage, in which a trusted third party is introduced to verify the integrity of operation behavior logs to enhance the credibility of forensic results as well as alleviate the burden of the forensic investigator. Further, we design a block-based logging approach to support selective verification and a hash-chain-based structure for each log block to ensure the forward security and append-only properties for log entries. Moreover, to achieve the tamper resistance of log blocks and non-repudiation of auditing proofs, we employ Merkle hash tree (MHT) to record the hash values of the aggregation authentication block tags sequentially and publish the root of MHT to the public once a block has been appended. Meanwhile, using the authentication property of MHT, our scheme can provide log-less verification with privacy preservation. We formally prove the security of the proposed scheme and evaluate its performance on entry appending and verification by concrete experiments and comparisons with the state-of-the-art schemes. The results demonstrate that the proposed scheme can effectively achieve secure auditing for log files of operation behaviors in cloud storage and outperforms the previous ones in computation complexity and communication overhead.
引用
收藏
页码:2175 / 2187
页数:13
相关论文
共 56 条
  • [1] Abdalla M, 2000, LECT NOTES COMPUT SC, V1976, P116
  • [2] Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges
    Accorsi, Rafael
    [J]. IMF 2009: 5TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSIC, 2009, : 94 - 110
  • [3] [Anonymous], 2013, P INT WORKSH SEC CLO, DOI DOI 10.1145/2484402.2484408
  • [4] [Anonymous], 2009, NIST DEFINITION CLOU
  • [5] [Anonymous], 2013, IEEE T COMPUT, DOI DOI 10.1109/TC.2011.245
  • [6] [Anonymous], 1997, Technical Report
  • [7] [Anonymous], 2014, SHA3 NAT I STAND TEC
  • [8] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [9] Bellare M., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P431
  • [10] Birk D., 2011, P 6 IEEE INT WORKSHO, P1