Data Integrity Auditing without Private Key Storage for Secure Cloud Storage

被引:38
|
作者
Shen, Wenting [1 ]
Qin, Jing [1 ,2 ]
Yu, Jia [3 ,4 ]
Hao, Rong [3 ]
Hu, Jiankun [5 ]
Ma, Jixin [6 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 10078, Peoples R China
[3] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[5] Univ New South Wales, Australian Def Force Acad UNSW ADFA, Sch Engn & IT, Cyber Secur Lab, Canberra, ACT 2052, Australia
[6] Univ Greenwich, Comp & Math Sci Dept, London SE10 9LS, England
基金
中国国家自然科学基金;
关键词
Cloud storage; data integrity auditing; data security; biometric data; DATA POSSESSION CHECKING; SHARED DATA;
D O I
10.1109/TCC.2019.2921553
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Using cloud storage services, users can store their data in the cloud to avoid the expenditure of local data storage and maintenance. To ensure the integrity of the data stored in the cloud, many data integrity auditing schemes have been proposed. In most, if not all, of the existing schemes, a user needs to employ his private key to generate the data authenticators for realizing the data integrity auditing. Thus, the user has to possess a hardware token (e.g., USB token, smart card) to store his private key and memorize a password to activate this private key. If this hardware token is lost or this password is forgotten, most of the current data integrity auditing schemes would be unable to work. In order to overcome this problem, we propose a new paradigm called data integrity auditing without private key storage and design such a scheme. In this scheme, we use biometric data (e.g., iris scan, fingerprint) as the user's fuzzy private key to avoid using the hardware token. Meanwhile, the scheme can still effectively complete the data integrity auditing. We utilize a linear sketch with coding and error correction processes to confirm the identity of the user. In addition, we design a new signature scheme which not only supports blockless verifiability, but also is compatible with the linear sketch. The security proof and the performance analysis show that our proposed scheme achieves desirable security and efficiency.
引用
收藏
页码:1408 / 1421
页数:14
相关论文
共 50 条
  • [1] A Compressive Integrity Auditing Protocol for Secure Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (03) : 1197 - 1209
  • [2] Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage
    Yu, Yong
    Li, Yannan
    Yang, Bo
    Susilo, Willy
    Yang, Guomin
    Bai, Jian
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 377 - 390
  • [3] Data integrity auditing for secure cloud storage using user behavior prediction
    Tian, Junfeng
    Wang, Haoning
    Wang, Meng
    [J]. COMPUTERS & SECURITY, 2021, 105
  • [4] Efficient Data Integrity Auditing Supporting Provable Data Update for Secure Cloud Storage
    Yang, Changsong
    Song, Bowen
    Ding, Yong
    Ou, Jiangtao
    Fan, Chengyuan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [5] A decentralized data integrity auditing scheme for cloud storage
    Liu, Jiaxian
    Huang, Hui
    Chen, Qunshan
    Huang, Zhenjie
    [J]. 2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 190 - 198
  • [6] Solution for Secure Private Data Storage in a Cloud
    Shatilov, Kirill
    Boiko, Vladislav
    Krendelev, Sergey
    Anisutina, Diana
    Sumaneev, Artem
    [J]. FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 885 - 889
  • [7] A Novel approach to Secure Cloud Data Storage and Dynamic Data Auditing in a Cloud
    Brindha, K.
    Jeyanthi, N.
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [8] Identity-based remote data integrity auditing from lattices for secure cloud storage
    Yang, Songrun
    Chang, Jinyong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5833 - 5844
  • [9] Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage
    Guan, Xuening
    Chang, Jinyong
    Zhang, Wei
    [J]. COMPUTER COMMUNICATIONS, 2024, 224 : 285 - 301
  • [10] Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
    Yu, Jia
    Wang, Huaqun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1931 - 1940