Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

被引:2
作者
Zhang, Yinghui [1 ,2 ]
Zhang, Tiantian [1 ]
Guo, Rui [1 ]
Xu, Shengmin [3 ]
Zheng, Dong [1 ,2 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Secure Mobile Ctr, Singapore 178902, Singapore
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2019年 / 13卷 / 11期
关键词
Identity privacy preserving; traceability; public auditing; user revocation; cloud storage; EFFICIENT; SCHEME; SECURE;
D O I
10.3837/tiis.2019.11.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.
引用
收藏
页码:5653 / 5672
页数:20
相关论文
共 34 条
  • [1] [Anonymous], IEEE T SERVICES COMP
  • [2] [Anonymous], IEEE T INFORM FORENS
  • [3] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [4] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [5] NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users
    Fu, Anmin
    Yu, Shui
    Zhang, Yuqing
    Wang, Huaqun
    Huang, Chanying
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2022, 8 (01) : 14 - 24
  • [6] Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
    Fu, Zhangjie
    Ren, Kui
    Shu, Jiangang
    Sun, Xingming
    Huang, Fengxiao
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (09) : 2546 - 2559
  • [7] A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS
    GOLDWASSER, S
    MICALI, S
    RIVEST, RL
    [J]. SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 281 - 308
  • [8] Efficient democratic group signatures with threshold traceability
    He G.-F.
    Li X.-X.
    Li Q.
    Zheng D.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 530 - 532
  • [9] Huang L, 2017, P 3 ACM SIGSPATIAL W, P1
  • [10] Privacy-Preserving Public Auditing for Non-manager Group Shared Data
    Huang, Longxia
    Zhang, Gongxuan
    Fu, Anmin
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (04) : 1277 - 1294