Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

被引:2
作者
Zhang, Yinghui [1 ,2 ]
Zhang, Tiantian [1 ]
Guo, Rui [1 ]
Xu, Shengmin [3 ]
Zheng, Dong [1 ,2 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Secure Mobile Ctr, Singapore 178902, Singapore
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2019年 / 13卷 / 11期
关键词
Identity privacy preserving; traceability; public auditing; user revocation; cloud storage; EFFICIENT; SCHEME; SECURE;
D O I
10.3837/tiis.2019.11.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.
引用
收藏
页码:5653 / 5672
页数:20
相关论文
共 34 条
  • [21] Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
    Wang, Ding
    He, Debiao
    Wang, Ping
    Chu, Chao-Hsien
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (04) : 428 - 442
  • [22] On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
    Wang, Ding
    Wang, Ping
    [J]. COMPUTER NETWORKS, 2014, 73 : 41 - 57
  • [23] Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
    Wang, Qian
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    Li, Jin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (05) : 847 - 859
  • [24] RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data
    Xiong, Jinbo
    Zhang, Yuanyuan
    Li, Xuan
    Lin, Mingwei
    Yao, Zhiqiang
    Liu, Guangjun
    [J]. MOBILE NETWORKS & APPLICATIONS, 2018, 23 (03) : 650 - 663
  • [25] Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
    Yu, Yong
    Au, Man Ho
    Ateniese, Giuseppe
    Huang, Xinyi
    Susilo, Willy
    Dai, Yuanshun
    Min, Geyong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 767 - 778
  • [26] Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification
    Yuan, Jiawei
    Yu, Shucheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) : 1717 - 1726
  • [27] Mind the Gap: Genetic Variation and Personalized Therapies for Cardiomyopathies
    Zhang, Yichi
    MacCosham, Aaron
    [J]. LIFESTYLE GENOMICS, 2018, 11 (02) : 77 - 79
  • [28] Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT
    Zhang, Yinghui
    Deng, Robert H.
    Zheng, Dong
    Li, Jin
    Wu, Pengfei
    Cao, Jin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (09) : 5099 - 5108
  • [29] Blockchain based efficient and robust fair payment for outsourcing services in cloud computing
    Zhang, Yinghui
    Deng, Robert H.
    Liu, Ximeng
    Zheng, Dong
    [J]. INFORMATION SCIENCES, 2018, 462 : 262 - 277
  • [30] Efficient and privacy-aware attribute-based data sharing in mobile cloud computing
    Zhang, Yinghui
    Wu, Axin
    Zheng, Dong
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1039 - 1048