Data Integrity Auditing without Private Key Storage for Secure Cloud Storage

被引:38
|
作者
Shen, Wenting [1 ]
Qin, Jing [1 ,2 ]
Yu, Jia [3 ,4 ]
Hao, Rong [3 ]
Hu, Jiankun [5 ]
Ma, Jixin [6 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 10078, Peoples R China
[3] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[5] Univ New South Wales, Australian Def Force Acad UNSW ADFA, Sch Engn & IT, Cyber Secur Lab, Canberra, ACT 2052, Australia
[6] Univ Greenwich, Comp & Math Sci Dept, London SE10 9LS, England
基金
中国国家自然科学基金;
关键词
Cloud storage; data integrity auditing; data security; biometric data; DATA POSSESSION CHECKING; SHARED DATA;
D O I
10.1109/TCC.2019.2921553
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Using cloud storage services, users can store their data in the cloud to avoid the expenditure of local data storage and maintenance. To ensure the integrity of the data stored in the cloud, many data integrity auditing schemes have been proposed. In most, if not all, of the existing schemes, a user needs to employ his private key to generate the data authenticators for realizing the data integrity auditing. Thus, the user has to possess a hardware token (e.g., USB token, smart card) to store his private key and memorize a password to activate this private key. If this hardware token is lost or this password is forgotten, most of the current data integrity auditing schemes would be unable to work. In order to overcome this problem, we propose a new paradigm called data integrity auditing without private key storage and design such a scheme. In this scheme, we use biometric data (e.g., iris scan, fingerprint) as the user's fuzzy private key to avoid using the hardware token. Meanwhile, the scheme can still effectively complete the data integrity auditing. We utilize a linear sketch with coding and error correction processes to confirm the identity of the user. In addition, we design a new signature scheme which not only supports blockless verifiability, but also is compatible with the linear sketch. The security proof and the performance analysis show that our proposed scheme achieves desirable security and efficiency.
引用
收藏
页码:1408 / 1421
页数:14
相关论文
共 50 条
  • [31] Efficient data integrity auditing for storage security in mobile health cloud
    Yongjun Ren
    Jian Shen
    Yuhui Zheng
    Jin Wang
    Han-Chieh Chao
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 854 - 863
  • [32] Self-certified Public Auditing for Data Integrity in Cloud Storage
    Zhang, Jianhong
    Zeng, Weina
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 267 - 273
  • [33] SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment
    Aujla, Gagangeet Singh
    Chaudhary, Rajat
    Kumar, Neeraj
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) : 78 - 85
  • [34] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    S. Anbuchelian
    C. M. Sowmya
    C. Ramesh
    [J]. Cluster Computing, 2019, 22 : 9767 - 9775
  • [35] Efficient data integrity auditing for storage security in mobile health cloud
    Ren, Yongjun
    Shen, Jian
    Zheng, Yuhui
    Wang, Jin
    Chao, Han-Chieh
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (05) : 854 - 863
  • [36] Multiple-replica integrity auditing schemes for cloud data storage
    Lin, Yangfei
    Li, Jie
    Jia, Xiaohua
    Ren, Kui
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (07):
  • [37] An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
    Yang, Kan
    Jia, Xiaohua
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (09) : 1717 - 1726
  • [38] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [39] Secure public data auditing scheme for cloud storage in smart city
    Wu, Libing
    Wang, Jing
    Kumar, Neeraj
    He, Debiao
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 949 - 962
  • [40] Enabling online/offline remote data auditing for secure cloud storage
    Gan, Qingqing
    Wang, Xiaoming
    Li, Jianwei
    Yan, Jiajun
    Li, Suyu
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3027 - 3041