Online/offline remote data auditing with strong key-exposure resilience for cloud storage

被引:3
|
作者
Gan, Qingqing [1 ,2 ]
Wang, Xiaoming [2 ]
Huang, Daxin [2 ]
Li, Jianwei [2 ]
Wang, Changji [1 ]
Liu, Zhen [1 ]
机构
[1] Guangdong Univ Foreign Studies, Dept Cyber Secur, Guangzhou 510006, Peoples R China
[2] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; Data auditing; Key exposure; Online/offline computation; SCHEME; SIGNATURES; PROOFS;
D O I
10.1016/j.csi.2023.103798
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Remote Data Auditing (RDA) with key-exposure resilience enables secure cloud data storage both earlier and later than the key exposure happens. However, most of existing solutions suffer from the security attack during the key-exposed time period, meaning the cloud server can still discard or tamper with the data owner's files in the key-exposure period. While others require a secure channel for key update, which is unrealistic and expensive under key-exposure scenarios. In this paper, we construct an online/offline RDA framework with strong key-exposure resilience, called S-OORDA, which can resist strong key-exposure attacks and achieve the integrity verification for cloud data efficiently. Then based on the framework, we present a concrete S-OORDA scheme supporting the data owner's secret key evolution without the secure channel. And the authenticators can be updated remotely at each time period, so as to prevent the attackers to forge the authenticators using the exposed auditing secret keys. Meanwhile, the data auditing process of the proposed scheme is divided to online and offline phases, greatly relieving the online computational burden of both the data owner and the third-party auditor. Security and performance analysis confirm that the proposed scheme meets the desired security and has the optimized efficiency.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
    Yu, Jia
    Wang, Huaqun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1931 - 1940
  • [2] Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience
    Nithya, S. Mary Virgil
    Uthariaraj, V. Rhymend
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [3] Enabling Cloud Storage Auditing With Key-Exposure Resistance
    Yu, Jia
    Ren, Kui
    Wang, Cong
    Varadharajan, Vijay
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1167 - 1179
  • [4] Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
    Hu, Chengyu
    Xu, Yuqin
    Liu, Pengtao
    Yu, Jia
    Guo, Shanqing
    Zhao, Minghao
    [J]. INFORMATION SCIENCES, 2020, 520 : 15 - 30
  • [5] Enabling online/offline remote data auditing for secure cloud storage
    Gan, Qingqing
    Wang, Xiaoming
    Li, Jianwei
    Yan, Jiajun
    Li, Suyu
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3027 - 3041
  • [6] Enabling online/offline remote data auditing for secure cloud storage
    Qingqing Gan
    Xiaoming Wang
    Jianwei Li
    Jiajun Yan
    Suyu Li
    [J]. Cluster Computing, 2021, 24 : 3027 - 3041
  • [7] Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage
    Guo, Hua
    Ma, Fangchao
    Li, Zhoujun
    Xia, Chunhe
    [J]. TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 127 - 136
  • [8] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [9] Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
    Zhang, Xiaojun
    Wang, Huaxiong
    Xu, Chunxiang
    [J]. INFORMATION SCIENCES, 2019, 472 : 223 - 234
  • [10] Key-exposure resilient integrity auditing scheme with encrypted data deduplication
    Zhang, Xiangsong
    Li, Chen
    Liu, Zhenhua
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (04): : 95 - 106