An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme

被引:0
作者
Kiraz, Mehmet Sabir [1 ]
Sertkaya, Isa [1 ]
Uzunkol, Osmanbey [1 ]
机构
[1] TUBITAK BILGEM, Math & Computat Sci, Kocaeli, Turkey
来源
2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST) | 2015年
关键词
Data storage; public auditability; privacy preserving; message recoverable signatures; bilinear maps; SECURE; PAIRINGS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the most important benefits of public cloud storage is outsourcing of management and maintenance with easy accessibility and retrievability over the internet. However, outsourcing data on the cloud brings new challenges such as integrity verification and privacy of data. More concretely, once the users outsource their data on the cloud they have no longer physical control over the data and this leads to the integrity protection issue. Hence, it is crucial to guarantee proof of data storage and integrity of the outsourced data. Several pairing-based auditing solutions have been proposed utilizing the Boneh-Lynn-Shacham (BLS) short signatures. They basically provide a desirable and efficient property of non-repudiation protocols. In this work, we propose the first ID-based privacy-preserving public auditing scheme with message recoverable signatures. Because of message recoverable auditing scheme, the message itself is implicitly included during the verification step that was not possible in previously proposed auditing schemes. Furthermore, we point out that the algorithm suites of existing schemes is either insecure or very inefficient due to the choice of the underlying bilinear map and its baseline parameter selections. We show that our scheme is more efficient than the recently proposed auditing schemes based on BLS like short signatures.
引用
收藏
页码:117 / 124
页数:8
相关论文
共 41 条
[1]  
Adj G., 2013, PAIRING BASED CRYPTO, P20
[2]  
Amazon.com, 2008, AM S3 AV EV JUL 20 2
[3]  
[Anonymous], 2014, IJIS
[4]  
[Anonymous], 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography
[5]  
Arrington M., 2006, Gmail Disaster: Reports Of Mass Email Deletions [Online]. Available
[6]  
Ateniese G., 2008, 2008114 CRYPT EPRINT
[7]  
ATENIESE G, 2007, 2007202 CRYPT EPRINT
[8]  
Barbulescu Razvan., 2013, CoRR
[9]  
Blake I., 2005, London Mathematical Society Lecture Note Series
[10]  
Boneh D., 2001, LNCS, V2248, P514, DOI DOI 10.1007/3-540-45682-1_30