On Indistinguishability in Remote Data Integrity Checking

被引:23
|
作者
Fan, Xinyu [1 ]
Yang, Guomin [1 ]
Mu, Yi [1 ]
Yu, Yong [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Informat & Comp Secur Res, Wollongong, NSW 2522, Australia
来源
COMPUTER JOURNAL | 2015年 / 58卷 / 04期
关键词
data integrity; data privacy; cloud storage; witness indistinguishability;
D O I
10.1093/comjnl/bxt137
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With a rapid growth of data storage in the cloud, data integrity checking in a remote data storage system has become an important issue. A number of protocols, which allow remote integrity checking by a third party, have been proposed. Although those protocols are provably secure, the data privacy issues in those protocols have not been considered. We believe that these issues are equally important since the communication flows of integrity proofs from the cloud server should not reveal any useful information of the stored data. In this paper, we introduce a new definition of data privacy called 'IND-Privacy' by an indistinguishability game. It is found that many existing remote integrity proofs are insecure under an IND-Privacy game. It is also found that by adopting witness indistinguishable proofs, the IND-Privacy is achievable. We provide an instantiation that captures data integrity, soundness and IND-privacy.
引用
收藏
页码:823 / 830
页数:8
相关论文
共 50 条
  • [1] REDICS: Remote Data Integrity Checking with Scalability
    Wan, Changsheng
    Zhang, Juan
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (06): : 1253 - 1262
  • [2] A Remote Data Integrity Checking Scheme for Big Data Storage
    Chen, Xingyue
    Shang, Tao
    Kim, Ilryong
    Liu, Jianwei
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 53 - 59
  • [3] A Study on Remote Data Integrity Checking Techniques in Cloud
    Sasikala, C.
    Bindu, C. Shoba
    [J]. 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 43 - 48
  • [4] A Survey of Remote Data Integrity Checking: Techniques and Verification Structures
    Chen, Yu
    Wang, Feng
    Zhu, Liehuang
    Zhang, Zijian
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (04): : 179 - 198
  • [5] Certificateless remote data integrity checking using lattices in cloud storage
    Sasikala, C.
    Bindu, C. Shoba
    [J]. NEURAL COMPUTING & APPLICATIONS, 2019, 31 (05): : 1513 - 1519
  • [6] Remote Data Integrity Checking Protocols from Homomorphic Hash Functions
    Xu, Wei
    Feng, Dan
    Liu, Jingning
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 604 - 608
  • [7] Improving Cloud Security by Enhancing Remote Data Integrity Checking Algorithm
    Suganya, S.
    Vincent, P. M. Durai Raj
    [J]. 2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
  • [8] Privacy-enhanced remote data integrity checking with updatable timestamp
    Wu, Tong
    Yang, Guomin
    Mu, Yi
    Chen, Rongmao
    Xu, Shengmin
    [J]. INFORMATION SCIENCES, 2020, 527 : 210 - 226
  • [9] Comment on id-based remote data integrity checking with data privacy preserving
    Zhang, Jianhong
    Meng, Hongxin
    [J]. 2017 2ND INTERNATIONAL SEMINAR ON ADVANCES IN MATERIALS SCIENCE AND ENGINEERING, 2017, 231
  • [10] A Wew Remote Data Integrity Checking Scheme for Cloud storage With Privacy Preserving
    Yan, Xiangtao
    Li, Yifa
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 704 - 708