Data Integrity Auditing without Private Key Storage for Secure Cloud Storage

被引:38
|
作者
Shen, Wenting [1 ]
Qin, Jing [1 ,2 ]
Yu, Jia [3 ,4 ]
Hao, Rong [3 ]
Hu, Jiankun [5 ]
Ma, Jixin [6 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 10078, Peoples R China
[3] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[5] Univ New South Wales, Australian Def Force Acad UNSW ADFA, Sch Engn & IT, Cyber Secur Lab, Canberra, ACT 2052, Australia
[6] Univ Greenwich, Comp & Math Sci Dept, London SE10 9LS, England
基金
中国国家自然科学基金;
关键词
Cloud storage; data integrity auditing; data security; biometric data; DATA POSSESSION CHECKING; SHARED DATA;
D O I
10.1109/TCC.2019.2921553
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Using cloud storage services, users can store their data in the cloud to avoid the expenditure of local data storage and maintenance. To ensure the integrity of the data stored in the cloud, many data integrity auditing schemes have been proposed. In most, if not all, of the existing schemes, a user needs to employ his private key to generate the data authenticators for realizing the data integrity auditing. Thus, the user has to possess a hardware token (e.g., USB token, smart card) to store his private key and memorize a password to activate this private key. If this hardware token is lost or this password is forgotten, most of the current data integrity auditing schemes would be unable to work. In order to overcome this problem, we propose a new paradigm called data integrity auditing without private key storage and design such a scheme. In this scheme, we use biometric data (e.g., iris scan, fingerprint) as the user's fuzzy private key to avoid using the hardware token. Meanwhile, the scheme can still effectively complete the data integrity auditing. We utilize a linear sketch with coding and error correction processes to confirm the identity of the user. In addition, we design a new signature scheme which not only supports blockless verifiability, but also is compatible with the linear sketch. The security proof and the performance analysis show that our proposed scheme achieves desirable security and efficiency.
引用
收藏
页码:1408 / 1421
页数:14
相关论文
共 50 条
  • [41] Enabling online/offline remote data auditing for secure cloud storage
    Qingqing Gan
    Xiaoming Wang
    Jianwei Li
    Jiajun Yan
    Suyu Li
    [J]. Cluster Computing, 2021, 24 : 3027 - 3041
  • [42] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [43] Public Data Integrity Verification Scheme for Secure Cloud Storage
    Ping, Yuan
    Zhan, Yu
    Lu, Ke
    Wang, Baocang
    [J]. INFORMATION, 2020, 11 (09)
  • [44] Public data integrity verification scheme for secure cloud storage
    Ping Y.
    Zhan Y.
    Lu K.
    Wang B.
    [J]. Ping, Yuan (pyuan.lhn@xcu.edu.cn); Wang, Baocang (bcwang79@aliyun.com), 1600, MDPI AG (11):
  • [45] Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage
    Garg, Neenu
    Nehra, Anushka
    Baza, Mohamed
    Kumar, Neeraj
    [J]. 2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [46] Secure Outsourced Data Transfer with Integrity Verification in Cloud Storage
    Ni, Jianbing
    Lin, Xiaodong
    Zhang, Kuan
    Yu, Yong
    Shen, Xuemin
    [J]. 2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,
  • [47] One secure data integrity verification scheme for cloud storage
    Fan, Yongkai
    Lin, Xiaodong
    Tan, Gang
    Zhang, Yuqing
    Dong, Wei
    Lei, Jing
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 376 - 385
  • [48] Data integrity checking with reliable data transfer for secure cloud storage
    Wang, Yong
    Tao, Xiaoling
    Ni, Jianbing
    Yu, Yong
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 106 - 121
  • [49] Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 331 - 346
  • [50] Public Auditing: Cloud Data Storage
    Parwekar, Pritee
    Saxena, Mayuri
    Kumar, Prakash
    Saxena, Sakshi
    [J]. 2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 169 - 173