Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

被引:126
作者
Yu, Jia [1 ,2 ,3 ]
Ren, Kui [2 ]
Wang, Cong [4 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Univ Buffalo State Univ New York, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[4] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Cloud storage; outsourcing computing; cloud storage auditing; key update; verifiability; SHARED DATA; SECURE;
D O I
10.1109/TIFS.2016.2528500
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys in every time period, which may inevitably bring in new local burdens to the client, especially those with limited computation resources, such as mobile phones. In this paper, we focus on how to make the key updates as transparent as possible for the client and propose a new paradigm called cloud storage auditing with verifiable outsourcing of key updates. In this paradigm, key updates can be safely outsourced to some authorized party, and thus the key-update burden on the client will be kept minimal. In particular, we leverage the third party auditor (TPA) in many existing public auditing designs, let it play the role of authorized party in our case, and make it in charge of both the storage auditing and the secure key updates for key-exposure resistance. In our design, TPA only needs to hold an encrypted version of the client's secret key while doing all these burdensome tasks on behalf of the client. The client only needs to download the encrypted secret key from the TPA when uploading new files to cloud. Besides, our design also equips the client with capability to further verify the validity of the encrypted secret keys provided by the TPA. All these salient features are carefully designed to make the whole auditing procedure with key exposure resistance as transparent as possible for the client. We formalize the definition and the security model of this paradigm. The security proof and the performance simulation show that our detailed design instantiations are secure and efficient.
引用
收藏
页码:1362 / 1375
页数:14
相关论文
共 36 条
[1]  
[Anonymous], 2008, P 4 INT C SEC PRIV C, DOI 10.1145/1460877.1460889
[2]  
[Anonymous], 2005, INT J INF SECUR, DOI DOI 10.1007/S10207-005-0070-3
[3]  
Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
[4]  
Atallah MJ, 2001, ADV COMPUT, V54, P215
[5]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[6]   Private and Cheating-Free Outsourcing of Algebraic Computations [J].
Benjamin, David ;
Atallah, Mikhail L. .
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, :240-245
[7]  
Chaum D., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P89
[8]   Secure Outsourced Attribute-Based Signatures [J].
Chen, Xiaofeng ;
Li, Jin ;
Huang, Xinyi ;
Li, Jingwei ;
Xiang, Yang ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (12) :3285-3294
[9]  
Chevallier-Mames B, 2010, LECT NOTES COMPUT SC, V6035, P24, DOI 10.1007/978-3-642-12510-2_3
[10]   MR-PDP: Multiple-Replica Provable Data Possession [J].
Curtmola, Reza ;
Khan, Osama ;
Burns, Randal ;
Ateniese, Giuseppe .
28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, :411-+