Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding

被引:8
|
作者
Fan, Yu [1 ]
Liao, Yongjian [1 ]
Li, Fagen [2 ]
Zhou, Shijie [1 ]
Zhang, Ganglin [1 ]
机构
[1] Univ ER Iron Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
关键词
Cloud computing; shared cloud data; remote auditing; sensitive information hiding; malicious manager preventing; DATA POSSESSION SCHEME; BIG DATA-STORAGE; ENCRYPTION SCHEME; USER REVOCATION; PRIVACY; PROTOCOL;
D O I
10.1109/ACCESS.2019.2932430
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of cloud computing arouses the flourish of data sharing, promoting the development of research, especially in the fields of data analysis, artificial intelligence, etc. In order to address sensitive information hiding, auditing shared data efficiently and malicious manager preventing, we propose an identity-based auditing scheme for shared cloud data with a secure mechanism to hide sensitive information. This scheme provides a solution that allows users to share plaintext with researchers and keeps sensitive information invisible to the cloud and researchers at the same time. Besides, a formal security analysis is given to prove the strong security of the proposed scheme. Performance evaluation and experimental results demonstrate that our scheme is significantly more efficient over the existing scheme due to our novel mechanism for sensitive information hiding and simplifying signature algorithm. Compared to the existing approach to audit the integrity of shared data with sensitive information hiding, our scheme has desirable features and advantages as follow. Firstly, previous work has failed to construct a secure scheme to prevent malicious manager. We fill this gap and guarantee the integrity and authenticity of shared data. Secondly, our scheme constructs a novel system model to support high concurrency and massive data in the real scenario.
引用
收藏
页码:114246 / 114260
页数:15
相关论文
共 50 条
  • [1] Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 331 - 346
  • [2] Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10434 - 10445
  • [3] Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
    Zhang, Yue
    Yu, Jia
    Hao, Rong
    Wang, Cong
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 608 - 619
  • [4] Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving
    Yan, Hao
    Gui, Wenming
    [J]. IEEE ACCESS, 2021, 9 : 45822 - 45831
  • [5] An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage
    Kumar, Mahender
    Maple, Carsten
    Chand, Satish
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (09)
  • [6] Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy
    Yu, Haiyang
    Cai, Yongquan
    Kong, Shanshan
    Ning, Zhenhu
    Xue, Fei
    Zhong, Han
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (10): : 5019 - 5041
  • [7] Identity-based remote data integrity auditing from lattices for secure cloud storage
    Yang, Songrun
    Chang, Jinyong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5833 - 5844
  • [8] A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing
    Hundera, Negalign Wake
    Mei, Qian
    Xiong, Hu
    Geressu, Dagmawit Mesfin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 455 - 472
  • [9] An identity-based online/offline secure cloud storage auditing scheme
    Rabaninejad, Reyhaneh
    Asaar, Maryam Rajabzadeh
    Attari, Mahmoud Ahmadian
    Aref, Mohammad Reza
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1455 - 1468
  • [10] An identity-based online/offline secure cloud storage auditing scheme
    Reyhaneh Rabaninejad
    Maryam Rajabzadeh Asaar
    Mahmoud Ahmadian Attari
    Mohammad Reza Aref
    [J]. Cluster Computing, 2020, 23 : 1455 - 1468