Online/offline remote data auditing with strong key-exposure resilience for cloud storage

被引:3
|
作者
Gan, Qingqing [1 ,2 ]
Wang, Xiaoming [2 ]
Huang, Daxin [2 ]
Li, Jianwei [2 ]
Wang, Changji [1 ]
Liu, Zhen [1 ]
机构
[1] Guangdong Univ Foreign Studies, Dept Cyber Secur, Guangzhou 510006, Peoples R China
[2] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; Data auditing; Key exposure; Online/offline computation; SCHEME; SIGNATURES; PROOFS;
D O I
10.1016/j.csi.2023.103798
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Remote Data Auditing (RDA) with key-exposure resilience enables secure cloud data storage both earlier and later than the key exposure happens. However, most of existing solutions suffer from the security attack during the key-exposed time period, meaning the cloud server can still discard or tamper with the data owner's files in the key-exposure period. While others require a secure channel for key update, which is unrealistic and expensive under key-exposure scenarios. In this paper, we construct an online/offline RDA framework with strong key-exposure resilience, called S-OORDA, which can resist strong key-exposure attacks and achieve the integrity verification for cloud data efficiently. Then based on the framework, we present a concrete S-OORDA scheme supporting the data owner's secret key evolution without the secure channel. And the authenticators can be updated remotely at each time period, so as to prevent the attackers to forge the authenticators using the exposed auditing secret keys. Meanwhile, the data auditing process of the proposed scheme is divided to online and offline phases, greatly relieving the online computational burden of both the data owner and the third-party auditor. Security and performance analysis confirm that the proposed scheme meets the desired security and has the optimized efficiency.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage
    Hou, Huiying
    Yu, Jia
    Zhang, Hanlin
    Xu, Yan
    Hao, Rong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (04): : 1849 - 1863
  • [42] Privacy preserving auditing protocol for remote data storage
    M. Suguna
    S. Mercy Shalinie
    [J]. Cluster Computing, 2019, 22 : 6891 - 6898
  • [43] Lightweight Cloud Storage Auditing With Deduplication Supporting Strong Privacy Protection
    Shen, Wenting
    Su, Ye
    Hao, Rong
    [J]. IEEE ACCESS, 2020, 8 : 44359 - 44372
  • [44] Privacy preserving cloud data auditing with efficient key update
    Li, Yannan
    Yu, Yong
    Yang, Bo
    Min, Geyong
    Wu, Huai
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 789 - 798
  • [45] Towards an analysis of data accountability and auditing for secure cloud data storage
    Prassanna, J.
    Punitha, K.
    Neelanarayanan, V
    [J]. BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 543 - 550
  • [46] A survey of public auditing for secure data storage in cloud computing
    [J]. Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [47] Division and Replication for data with public auditing scheme for cloud storage
    Salunkhe, Sujata D.
    Patil, Dhanshri
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [48] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [49] A Continuous Sampling Method for Batch Data Auditing in Cloud Storage
    Daniel, Esther
    Durga, S.
    Vijila, M.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SYSTEMS IN THE SERVICE SECTOR, 2021, 13 (02) : 1 - 12
  • [50] Mutual Verifiable Provable Data Auditing in Public Cloud Storage
    Ren, Yongjun
    Shen, Jian
    Wang, Jin
    Han, Jin
    Lee, Sungyoung
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (02): : 317 - 323