Enabling cloud storage auditing with key-exposure resilience under continual key-leakage

被引:13
|
作者
Hu, Chengyu [1 ,2 ,3 ]
Xu, Yuqin [4 ]
Liu, Pengtao [5 ]
Yu, Jia [6 ]
Guo, Shanqing [1 ,2 ]
Zhao, Minghao [7 ]
机构
[1] Shandong Univ, Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan 250100, Peoples R China
[2] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Key Lab Network Assessment Technol, Beijing 100093, Peoples R China
[4] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[5] Shandong Univ Polit Sci & Law, Coll Cyberspace Secur, Jinan 250014, Peoples R China
[6] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[7] Tsinghua Univ, Sch Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Data storage; Cloud storage auditing; Continual key-leakage resilience; Forward security;
D O I
10.1016/j.ins.2020.02.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage auditing is a service that is usually provided to enable clients to verify the integrity of their data stored in the cloud. However, clients risk exposing their secret key. To address the problem of key exposure, researchers have provided "Forward Security" by dividing the entire lifetime of the secret key into several periods and updating the secret key within each of these periods. Forward security can ensure the validity of authenticators before the period in which the secret key is fully exposed. However, the security of these protocols can be broken by launching side-channel attacks to leak the secret key partially rather than fully. In this study, we focus on implementing measures in cloud storage auditing to protect against side-channel attacks in practice. We formalize the definition and security model of a cloud storage auditing protocol, which supports forward security under continual key-leakage, and construct the first protocol. Our protocol remains secure even if an adversary obtains partial leakage of the secret key during a period. In addition, if the secret key were to be fully disclosed in a certain period, our protocol would maintain forward security. Therefore, the proposed protocol provides stronger security compared with existing protocols. (c) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:15 / 30
页数:16
相关论文
共 26 条
  • [21] Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage
    Huiying Hou
    Jia Yu
    Hanlin Zhang
    Yan Xu
    Rong Hao
    [J]. Cluster Computing, 2018, 21 : 1849 - 1863
  • [22] Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage
    Hou, Huiying
    Yu, Jia
    Zhang, Hanlin
    Xu, Yan
    Hao, Rong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (04): : 1849 - 1863
  • [23] Securing smart grid data under key exposure and revocation in cloud computing
    Navya, J. M.
    Sanjay, H. A.
    Deepika, K. M.
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROL, COMMUNICATION AND COMPUTING (I4C), 2018,
  • [24] On the Algorithmic Computability of the Secret Key and Authentication Capacity Under Channel, Storage, and Privacy Leakage Constraints
    Boche, Holger
    Schaefer, Rafael E.
    Baur, Sebastian
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2019, 67 (17) : 4636 - 4648
  • [25] Verifying multiple replica possession with public key segment under public cloud storage environment
    Fu, Wei
    Xie, Zhenjie
    Xu, Jianqiao
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05):
  • [26] A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    Liu, Ximeng
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 284 - 294