Computer Science ›› 2017, Vol. 44 ›› Issue (5): 95-99.doi: 10.11896/j.issn.1002-137X.2017.05.017

Previous Articles     Next Articles

Virtual-user-based Public Auditing Integrity in Cloud Storage

XU Yun-yun, BAI Guang-wei, SHEN Hang and HUANG Zhong-ping   

  • Online:2018-11-13 Published:2018-11-13

Abstract: A public auditing integrity mechanism based on the virtual user was proposed,addressing collusion issue between the revoked user and cloud.After the user is revoked from the group,the manager lets the proxy resign the blocks with the virtual user’s signature,which utilizes proxy re-signature to protect user’s privacy.In addition,the manager verifies the user who want to access the shared data via a local list consisting of all users’ identity,with objective of auditing data integrity and protecting user’s privacy.Theoretical analysis shows that our framework achieves significant performance improvement in security and privacy,and it can decrease the probability of an adversary to get the users’ identity privacy and the data in the cloud.

Key words: Cloud storage,Preserve privacy,Proxy re-signature,User revocation,Virtual user

[1] LING C,SU W B,MENG K,et al.Cloud computing security:Architecture,Mechanism and Modeling[J].Journal of compu-ter,2013,36(9):1765-1784.(in Chinese) 林闯,苏文博,孟坤,等.云计算安全:架构,机制与模型评价[J].计算机学报,2013,6(9):1765-1784.
[2] LI H,SUN W H,LI F H,et al.Secure and Privacy-Preserving Data Storage Service in Public Cloud[J].Journal of Computer Research and Development,2014,51(7):1397-1409.(in Chinese) 李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409.
[3] ARMBRUST M,FOX A,GRIFFITH R A,et al.A View ofCloud Computing[J].Communications of the ACM,2010,53(4):50-58.
[4] ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores [C]∥The Proceedings of ACM CCS 2007.2007:598-610.
[5] SHACHAM H,WATERS B.Compact Proofs of Retrievability [C]∥Proceedings of ASIAC RYPT 2008,LNCS.Springer,Heidelberg,2008,5350:90-107.
[6] WANG C,WANG Q,REN K,et al.Privacy-preserving PublicAuditing for Data Storage Security in Cloud Computing [C]∥Proceedings of IEEE INFOCOM.2010:525-533.
[7] ZHU Y,WANG H,HU Z,et al.Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds [C]∥the Proceedings of ACM SAC 2011.2011:1550-1557.
[8] WANG C,WANG Q,REN K,et al.Towards Secure and Dependable Storage Services in Cloud Computing [J].IEEE Tran-sactions on Services Computing,2011,5(2):220-232.
[9] CAO N,YU S,YANG Z,et al.LT Codes-based Secure and Relia-ble Cloud Storage Service [C]∥The Proceedings of IEEE INFOCOM 2012.2012:693-701.
[10] WANG B,LI B,LI H.Panda:Public Auditing for Shared Data with Efficient User Revocation in the Cloud [J].IEEE Transactions on Services Computing,2015,8(1):92-106.
[11] BLAZE M,BLEUMER G,STRAUSS M.Divertible protocolsand atomic proxy cryptography [C]∥Advance in Cryptology- EUROCRYPT 98.1998:127-144.
[12] ATENIESE G,HOHENBERGER S.Proxy Re-signatures:New Definitions,Algorithms and Applications [C]∥Proceeding of ACM CCS 2005.2005:310-319.
[13] WANG C,CHOW S S M,WANG Q,et al.Privacy-preserving public auditing for secure cloud storage [J].IEEE Transactions on Computers,2013,62(2):362-375.
[14] ZHANG J,TANG W,MAO J.Efficient public verification proof of retrievability scheme in cloud [J].Cluster Computing,2014,17(17):1401-1411.
[15] WANG B,LI B,LI H.Oruta:Privacy-preserving public auditing for shared data in the cloud [C]∥Proc.of IEEE 5th Internatio-nal Conference on Cloud Computing (CLOUD).2012:295-302.
[16] YU Y,NI J,AU M,et al.On the security of a public auditing mechanism for shared cloud data service[J].IEEE Transaction Services Computing,1939,8(6):1.
[17] YUAN J,YU S.Public integrity auditing for dynamic data sharing with multiuser modification [J].IEEE Trans.Inf.Forensics and Secur,2015,10(8):1717-1726.
[18] BONEH D,GENTRY C,LYNN B,et al.Aggregate and Verifia-bly Encrypted Signatures from Bilinear Maps [M]∥The Proceedings of EUROCRYPT 2003.Springer-Verlag,2003:416-432.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!