Privacy-Preserving Cloud Auditing with Multiple Uploaders

被引:15
|
作者
Wu, Ge [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
Guo, Fuchun [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
Cloud storage; Provable data possession; Public auditing; Identity privacy; Multiple uploaders;
D O I
10.1007/978-3-319-49151-6_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The provable data possession (PDP) allows the cloud server to prove that its client's data is securely stored, and allows the data uploader to check the integrity of the data ( alternatively, a third party auditor (TPA) can perform the auditing on behalf of the uploader). Sharing data among multiple uploaders is another attracting advantage of cloud storage. However, privacy issues on multiple uploaders should be considered. During an auditing process, the TPA should not be able to learn the identity of the uploader. To address this problem, some privacy preserving auditing schemes were found in the literature, utilizing ring signature or group signature techniques, which are not computationally efficient. How to improve efficiency in a cloud storage system with multiple uploaders is a challenge. In this paper, we propose an anonymous cloud auditing scheme with multiple uploaders (ACAMU). The authentication tag of a message consists of only one element. Therefore, the storage cost of the tags and the transmission and verification cost during the auditing process can be significantly reduced. We provide a full security proof for our scheme. Meanwhile, our scheme achieves unconditional anonymity for the uploaders, namely, the TPA cannot distinguish the identity of the uploader even though it holds all the uploaders' secret keys after performing the auditing operation.
引用
收藏
页码:224 / 237
页数:14
相关论文
共 50 条
  • [1] Threshold privacy-preserving cloud auditing with multiple uploaders
    Ge Wu
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Futai Zhang
    International Journal of Information Security, 2019, 18 : 321 - 331
  • [2] Threshold privacy-preserving cloud auditing with multiple uploaders
    Wu, Ge
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Zhang, Futai
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (03) : 321 - 331
  • [3] Privacy-Preserving Certificateless Cloud Auditing with Multiple Users
    Ge Wu
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Futai Zhang
    Wireless Personal Communications, 2019, 106 : 1161 - 1182
  • [4] Privacy-Preserving Certificateless Cloud Auditing with Multiple Users
    Wu, Ge
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Zhang, Futai
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (03) : 1161 - 1182
  • [5] Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability
    Yang, Xiaodong
    Wang, Meiding
    Li, Ting
    Liu, Rui
    Wang, Caifen
    IEEE ACCESS, 2020, 8 : 130866 - 130877
  • [6] Privacy-preserving public auditing for data integrity in cloud
    Saleem, M. Shaik
    Murali, M.
    PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18), 2018, 1000
  • [7] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [8] An Efficient Cloud Auditing Scheme for Data Integrity and Identity-Privacy of Multiple Uploaders
    Al-Odat, Zeyad
    Khan, Samee
    2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 8 - 13
  • [9] Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (01) : 43 - 56
  • [10] Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage
    Kang, Baoyuan
    Wang, Jiaqiang
    Shao, Dongyang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017