Dynamic Group-Oriented Provable Data Possession in the Cloud

被引:49
作者
He, Kun [1 ]
Chen, Jing [1 ,2 ,3 ]
Yuan, Quan [4 ]
Ji, Shouling [5 ,6 ,7 ]
He, Debiao [1 ]
Du, Ruiying [1 ,8 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Shenzhen Inst, Shenzhen, Peoples R China
[3] Sci & Technol Commun Secur Lab, Chengdu, Peoples R China
[4] Univ Texas Permian Basin, Comp Sch, Odessa, TX 79762 USA
[5] Zhejiang Univ, Inst Cyberspace Res, Hangzhou 310027, Peoples R China
[6] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
[7] Alibaba Zhejiang Univ Joint Inst Frontier Technol, Hangzhou, Peoples R China
[8] Collaborat Innovat Ctr Geospatial Technol, Wuhan, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud computing; Data models; Data integrity; Computational modeling; Cryptography; Aerodynamics; Provable data possession; blockless Merkle tree; permission-based signature; EFFICIENT USER REVOCATION; SHARED DATA; STORAGE;
D O I
10.1109/TDSC.2019.2925800
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As an important security property of cloud storage, data integrity has not been sufficiently studied under the multi-writer model, where a group of users work on shared files collaboratively and any group member can update the data by modification, insertion, and deletion operations. Existing works under such multi-writer model would bring large storage cost to the third-party verifiers. Furthermore, to the best of our knowledge, none of the existing works for shared files supports fully dynamic operations, which implies that users cannot freely perform the update operations. In this paper, we propose the first public auditing scheme for shared data that supports fully dynamic operations and achieves constant storage cost for the verifiers. Our scheme, named PRAYS, is boosted by a new paradigm for remote data integrity checking. To implement the new paradigm, we proposed a specially designed authenticated structure, called blockless Merkle tree, and a novel cryptographic primitive, called permission-based signature. Extensive evaluation demonstrates that PRAYS is as efficient as the existing less-functional solutions. We believe that PRAYS is an important step towards designing practical multi-writer cloud storage systems.
引用
收藏
页码:1394 / 1408
页数:15
相关论文
共 36 条
[1]  
Ateniese G., 2008, P SECURECOMM
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]  
Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
[4]  
Cash D, 2013, LECT NOTES COMPUT SC, V7881, P279, DOI 10.1007/978-3-642-38348-9_17
[5]  
Catalano Dario, 2014, Security and Cryptography for Networks. 9th International Conference (SCN 2014). Proceedings: LNCS 8642, P514, DOI 10.1007/978-3-319-10879-7_29
[6]  
Chen J, 2018, IEEE INFOCOM SER, P2069
[7]   Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services [J].
Chen, Jing ;
He, Kun ;
Yuan, Quan ;
Chen, Min ;
Du, Ruiying ;
Xiang, Yang .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (11) :2524-2535
[8]   Riposte: An Anonymous Messaging System Handling Millions of Users [J].
Corrigan-Gibbs, Henry ;
Boneh, Dan ;
Mazieres, David .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :321-338
[9]   Dynamic Provable Data Possession [J].
Erway, C. Chris ;
Kupcu, Alptekin ;
Papamanthou, Charalampos ;
Tamassia, Roberto .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
[10]  
Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213