Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

被引:0
|
作者
Wang, Cong [1 ]
Wang, Qian [1 ]
Ren, Kui [1 ]
Lou, Wenjing [2 ]
机构
[1] IIT, Dept ECE, Chicago, IL 60616 USA
[2] Worcester Polytech Inst, Dept ECE, Worcester, MA USA
基金
美国国家科学基金会;
关键词
PROOFS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should bring in no new vulnerabilities towards user data privacy. In this paper, we utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
    Alkhojandi, Naelah
    Miri, Ali
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 35 - 48
  • [2] Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
    Tian, Hui
    Nan, Fulin
    Chang, Chin-Chen
    Huang, Yongfeng
    Lu, Jing
    Du, Yongqian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 127 : 59 - 69
  • [3] Privacy-preserving public auditing for educational multimedia data in cloud computing
    Kim, Daeyeong
    Kwon, Hyunsoo
    Hahn, Changhee
    Hur, Junbeom
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13077 - 13091
  • [4] Privacy-preserving public auditing for educational multimedia data in cloud computing
    Daeyeong Kim
    Hyunsoo Kwon
    Changhee Hahn
    Junbeom Hur
    [J]. Multimedia Tools and Applications, 2016, 75 : 13077 - 13091
  • [5] Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage
    Zhao, Xia'nan
    Wang, Dongsheng
    [J]. 2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 486 - 491
  • [6] Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage
    Yan, Hao
    Liu, Yanan
    Zhang, Zheng
    Wang, Qian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [8] Privacy-preserving public auditing for data integrity in cloud
    Saleem, M. Shaik
    Murali, M.
    [J]. PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18), 2018, 1000
  • [9] Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
    Liu, Hongyu
    Chen, Leiting
    Davar, Zahra
    Pour, Mohammad Ramezanian
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 473 - 482
  • [10] Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage
    Ren Zhengwei
    Wang Lina
    Wu Qianhong
    Deng Ruyi
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 297 - 301