Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud

被引:3
|
作者
Ullah, Fasee [1 ,2 ]
Pun, Chi-Man [1 ]
机构
[1] Univ Macau, Dept Comp & Informat Sci, Taipa, Macao, Peoples R China
[2] Sarhad Univ Sci & Informat Technol, Peshawar 25000, Pakistan
关键词
Cloud computing; Security; Time division multiplexing; Organizations; Costs; Data privacy; Servers; Auditing; authenticator; dynamics; error identification; parity bits; privacy; recovery; tag; user revocation; BIG DATA-STORAGE; SHARED DATA; PROTOCOL;
D O I
10.1109/TCSS.2022.3165213
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The significance of the cloud enables the data owners (DOs) to store data remotely in cloud server (CS). The external and internal attacks on the stored data at CS can deliberately remove data. Furthermore, the CS removes the stored data to make empty location for the user's upcoming new data. However, it is a legal expectation of DOs to know whether their data are correctly stored or altered in CS. In this article, we propose a novel privacy-aware and hash-parity-bits-based public auditing (PA-HPPA) framework to secure full data, left half of the data, and the right half of the data, generated by a DO. DO generates two private key pairs with the assistance of a virtual key and a user ID (IP). The virtual key is the sequence number of DO who is registered and provided by the trusted data manager (TDM) while IP is the sequence number of DO working in an organization. Subsequently, DO blinds the categorized data and generates their signatures and hashes. In addition, DO generates the parity bits using xor and assigns to each hard drive (HD) in CS, which assistants to TDM in public auditing. Second, how to identify the error in the stored data and how to securely recover the error/missed data? Extension to the framework, the novel proposed data error identification and secure data recovery produce tags for installed HDs of CS using truth table and recover the altered/missed data via a authenticator, which is produced using xor function. Third, how to protect a valid user from revocation and, in case a user has revoked on merit basis, then how to securely access the stored data of it? This novel work has proposed three conditions to meet the validity of the valid user from revocation and securely generating the public-private key pairs to access the stored data of the revoked user securely from CS. Fourth, there is an efficient novel proposed dynamic operation scheme to insert, update, or delete the stored data at CS without regenerating the signatures, hashes, and tags for the whole stored data in cloud. The security analysis and the performance evaluation of the proposed solutions are provably efficient and secure with reduced communication costs.
引用
收藏
页码:3090 / 3107
页数:18
相关论文
共 50 条
  • [21] A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage
    Rabaninejad, Reyhaneh
    Attari, Mahmoud Ahmadian
    Asaar, Maryam Rajabzadeh
    Aref, Mohammad Reza
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 1 - 15
  • [22] Public integrity auditing for dynamic group cooperation files with efficient user revocation
    Li, Yanping
    Li, Yanzhuo
    Zhang, Kai
    Ding, Yong
    COMPUTER STANDARDS & INTERFACES, 2023, 83
  • [23] Dual Revocation: Attribute and User Revocation Based On CPABE In Cloud Computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [24] Comment on "A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage"
    Chang, Jinyong
    Shao, Bilin
    Ji, Yanyan
    Bian, Genqing
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2633 - 2634
  • [25] Enabling Fast Public Auditing and Data Dynamics in Cloud Services
    Hahn, Changhee
    Kwon, Hyunsoo
    Kim, Daeyeong
    Hur, Junbeom
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2047 - 2059
  • [26] Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System
    Zhang, Wei
    Wu, Yi
    Xiong, Hu
    Qin, Zhiguang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (01): : 302 - 322
  • [27] Enabling identity-based cloud storage public auditing with quantum computers resistance
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (01) : 82 - 98
  • [28] Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments
    Chen, Feng
    Zhou, Hong
    Luo, Yuchuan
    Chen, Yingwen
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 1 - 8
  • [29] Efficient public auditing scheme for non-administrator group with secure user revocation
    Chen, Jinliang
    Zhou, Tianqi
    Ji, Sai
    Tan, Haowen
    Zheng, Wenying
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 80
  • [30] Public Possession Checking for Shared Data with User Revocation in Cloud Computing
    Wei, Jinxia
    Liu, Jianyi
    Zhang, Ru
    Niu, Xinxin
    Yao, Yuangang
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (06): : 1141 - 1149