Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud

被引:3
|
作者
Ullah, Fasee [1 ,2 ]
Pun, Chi-Man [1 ]
机构
[1] Univ Macau, Dept Comp & Informat Sci, Taipa, Macao, Peoples R China
[2] Sarhad Univ Sci & Informat Technol, Peshawar 25000, Pakistan
关键词
Cloud computing; Security; Time division multiplexing; Organizations; Costs; Data privacy; Servers; Auditing; authenticator; dynamics; error identification; parity bits; privacy; recovery; tag; user revocation; BIG DATA-STORAGE; SHARED DATA; PROTOCOL;
D O I
10.1109/TCSS.2022.3165213
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The significance of the cloud enables the data owners (DOs) to store data remotely in cloud server (CS). The external and internal attacks on the stored data at CS can deliberately remove data. Furthermore, the CS removes the stored data to make empty location for the user's upcoming new data. However, it is a legal expectation of DOs to know whether their data are correctly stored or altered in CS. In this article, we propose a novel privacy-aware and hash-parity-bits-based public auditing (PA-HPPA) framework to secure full data, left half of the data, and the right half of the data, generated by a DO. DO generates two private key pairs with the assistance of a virtual key and a user ID (IP). The virtual key is the sequence number of DO who is registered and provided by the trusted data manager (TDM) while IP is the sequence number of DO working in an organization. Subsequently, DO blinds the categorized data and generates their signatures and hashes. In addition, DO generates the parity bits using xor and assigns to each hard drive (HD) in CS, which assistants to TDM in public auditing. Second, how to identify the error in the stored data and how to securely recover the error/missed data? Extension to the framework, the novel proposed data error identification and secure data recovery produce tags for installed HDs of CS using truth table and recover the altered/missed data via a authenticator, which is produced using xor function. Third, how to protect a valid user from revocation and, in case a user has revoked on merit basis, then how to securely access the stored data of it? This novel work has proposed three conditions to meet the validity of the valid user from revocation and securely generating the public-private key pairs to access the stored data of the revoked user securely from CS. Fourth, there is an efficient novel proposed dynamic operation scheme to insert, update, or delete the stored data at CS without regenerating the signatures, hashes, and tags for the whole stored data in cloud. The security analysis and the performance evaluation of the proposed solutions are provably efficient and secure with reduced communication costs.
引用
收藏
页码:3090 / 3107
页数:18
相关论文
共 50 条
  • [1] Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage
    Guo, Hua
    Ma, Fangchao
    Li, Zhoujun
    Xia, Chunhe
    TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 127 - 136
  • [2] Public Auditing for shared data in cloud with safe user revocation
    Samundiswary, S.
    Dongre, Nilima M.
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 53 - 57
  • [3] Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2904 - 2912
  • [4] CLUSTER BASED PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT GROUP USER REVOCATION IN THE CLOUD
    Raghavan, Parimala
    Subasree
    Sakthivel
    IIOAB JOURNAL, 2016, 7 (09) : 503 - 508
  • [5] Public Auditing Scheme for Cloud Data with User Revocation and Data Dynamics
    Yang Xiaodong
    Liu Tingting
    Yang Ping
    An Faying
    Yang Miaomiao
    Xiao Likun
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 813 - 817
  • [6] Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (01) : 92 - 106
  • [7] Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Dongare, Dnyanada
    Kadroli, Vijayalakshmi
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [8] Public Auditing for Shared Data Utilizing Backups with User Revocation in the Cloud
    LIU Hequn
    WANG Baocang
    LU Ke
    GAO Ziyuan
    ZHAN Yu
    WuhanUniversityJournalofNaturalSciences, 2018, 23 (02) : 129 - 138
  • [9] Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
    Zhang, Yue
    Yu, Jia
    Hao, Rong
    Wang, Cong
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 608 - 619
  • [10] On the Security of a Public Auditing Protocol for Shared Data with Efficient User Revocation in the Cloud
    Ma, FangChao
    Li, Hechao
    Guo, Hua
    Xia, ChunHe
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1647 - 1655