Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information

被引:5
|
作者
Yang, Yang [1 ]
Chen, Yanjiao [2 ]
Chen, Fei [3 ]
Chen, Jing [4 ]
机构
[1] Zhongnan Univ Econ & Law, Sch Informat & Secur Engn, Wuhan 430073, Peoples R China
[2] Zhejiang Univ, Coll Elect Engn, Hangzhou 310007, Zhejiang, Peoples R China
[3] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[4] Wuhan Univ, Comp Sch, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Protocols; Data integrity; Servers; Privacy; Medical services; Data models; Access control; cloud storage auditing; data integrity; sensitive information hiding;
D O I
10.1109/JIOT.2021.3121678
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote data integrity auditing ensures the integrity of cloud storage. In practice, cloud users may not want their sensitive data to be exposed to others. Thus, it is meaningful to investigate how to realize data sharing with sensitive information hiding in cloud storage auditing. Up to now, cloud storage has been proven to achieve the sensitive information hiding property through a third-party sanitizer dedicated to sanitize user data, which leads to high outlays on purchasing and maintaining a special server. To meet this challenge, we design a novel cloud storage auditing protocol to support sensitive information hiding without the need of a third-party sanitizer. In addition, our scheme allows data owners to enable or disable other users to access their sensitive information with the help of the cloud that dose not deviate from the agreement during access control. To be specific, only after receiving the delegations from the data owner, the users can compute the valid warrants that can pass the access verification of the cloud. The proposed protocol is built on identity-based cryptography, thus avoiding the complex certificate management. We validate the advantages of the proposed protocol through massive theoretical analysis and experimental results.
引用
收藏
页码:10434 / 10445
页数:12
相关论文
共 50 条
  • [1] Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 331 - 346
  • [2] Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding
    Fan, Yu
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    Zhang, Ganglin
    [J]. IEEE ACCESS, 2019, 7 : 114246 - 114260
  • [3] Certificateless Remote Data Integrity Auditing with Access Control of Sensitive Information in Cloud Storage
    Bian, Genqing
    Zhang, Fan
    Li, Rong
    Shao, Bilin
    [J]. ELECTRONICS, 2022, 11 (19)
  • [4] Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
    Zhao, Chenbin
    Xu, Li
    Li, Jiguo
    Wang, Feng
    Fang, He
    [J]. IEEE ACCESS, 2019, 7 : 160459 - 160471
  • [5] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    [J]. IEEE ACCESS, 2020, 8 : 206396 - 206405
  • [6] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [7] Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
    He, Debiao
    Wang, Huaqun
    Zhang, Jianhong
    Wang, Lina
    [J]. INFORMATION SCIENCES, 2017, 375 : 48 - 53
  • [8] Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data
    Tian, Hui
    Peng, Fang
    Quan, Hanyu
    Chang, Chin-Chen
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [9] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Wu, Li-bing
    Wang, Jing
    He, De-biao
    Khan, Muhammad-Khurram
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (12) : 1972 - 1977
  • [10] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Li-bing Wu
    Jing Wang
    De-biao He
    Muhammad-Khurram Khan
    [J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1972 - 1977