Enabling cloud storage auditing with key-exposure resilience under continual key-leakage

被引:13
|
作者
Hu, Chengyu [1 ,2 ,3 ]
Xu, Yuqin [4 ]
Liu, Pengtao [5 ]
Yu, Jia [6 ]
Guo, Shanqing [1 ,2 ]
Zhao, Minghao [7 ]
机构
[1] Shandong Univ, Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan 250100, Peoples R China
[2] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Key Lab Network Assessment Technol, Beijing 100093, Peoples R China
[4] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[5] Shandong Univ Polit Sci & Law, Coll Cyberspace Secur, Jinan 250014, Peoples R China
[6] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[7] Tsinghua Univ, Sch Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Data storage; Cloud storage auditing; Continual key-leakage resilience; Forward security;
D O I
10.1016/j.ins.2020.02.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage auditing is a service that is usually provided to enable clients to verify the integrity of their data stored in the cloud. However, clients risk exposing their secret key. To address the problem of key exposure, researchers have provided "Forward Security" by dividing the entire lifetime of the secret key into several periods and updating the secret key within each of these periods. Forward security can ensure the validity of authenticators before the period in which the secret key is fully exposed. However, the security of these protocols can be broken by launching side-channel attacks to leak the secret key partially rather than fully. In this study, we focus on implementing measures in cloud storage auditing to protect against side-channel attacks in practice. We formalize the definition and security model of a cloud storage auditing protocol, which supports forward security under continual key-leakage, and construct the first protocol. Our protocol remains secure even if an adversary obtains partial leakage of the secret key during a period. In addition, if the secret key were to be fully disclosed in a certain period, our protocol would maintain forward security. Therefore, the proposed protocol provides stronger security compared with existing protocols. (c) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:15 / 30
页数:16
相关论文
共 26 条
  • [1] Enabling Cloud Storage Auditing With Key-Exposure Resistance
    Yu, Jia
    Ren, Kui
    Wang, Cong
    Varadharajan, Vijay
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1167 - 1179
  • [2] Online/offline remote data auditing with strong key-exposure resilience for cloud storage
    Gan, Qingqing
    Wang, Xiaoming
    Huang, Daxin
    Li, Jianwei
    Wang, Changji
    Liu, Zhen
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [3] Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
    Yu, Jia
    Wang, Huaqun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1931 - 1940
  • [4] Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience
    Nithya, S. Mary Virgil
    Uthariaraj, V. Rhymend
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [5] Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage
    Guo, Hua
    Ma, Fangchao
    Li, Zhoujun
    Xia, Chunhe
    [J]. TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 127 - 136
  • [6] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [7] Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
    Zhang, Xiaojun
    Wang, Huaxiong
    Xu, Chunxiang
    [J]. INFORMATION SCIENCES, 2019, 472 : 223 - 234
  • [8] Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
    Yu, Jia
    Ren, Kui
    Wang, Cong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1362 - 1375
  • [9] Key-exposure resilient integrity auditing scheme with encrypted data deduplication
    Zhang, Xiangsong
    Li, Chen
    Liu, Zhenhua
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (04): : 95 - 106
  • [10] A blockchain-based data auditing scheme with key-exposure resistance for IIoT
    Yang, Pan
    Ren, Jingli
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (02)