Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud

被引:3
|
作者
Ullah, Fasee [1 ,2 ]
Pun, Chi-Man [1 ]
机构
[1] Univ Macau, Dept Comp & Informat Sci, Taipa, Macao, Peoples R China
[2] Sarhad Univ Sci & Informat Technol, Peshawar 25000, Pakistan
关键词
Cloud computing; Security; Time division multiplexing; Organizations; Costs; Data privacy; Servers; Auditing; authenticator; dynamics; error identification; parity bits; privacy; recovery; tag; user revocation; BIG DATA-STORAGE; SHARED DATA; PROTOCOL;
D O I
10.1109/TCSS.2022.3165213
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The significance of the cloud enables the data owners (DOs) to store data remotely in cloud server (CS). The external and internal attacks on the stored data at CS can deliberately remove data. Furthermore, the CS removes the stored data to make empty location for the user's upcoming new data. However, it is a legal expectation of DOs to know whether their data are correctly stored or altered in CS. In this article, we propose a novel privacy-aware and hash-parity-bits-based public auditing (PA-HPPA) framework to secure full data, left half of the data, and the right half of the data, generated by a DO. DO generates two private key pairs with the assistance of a virtual key and a user ID (IP). The virtual key is the sequence number of DO who is registered and provided by the trusted data manager (TDM) while IP is the sequence number of DO working in an organization. Subsequently, DO blinds the categorized data and generates their signatures and hashes. In addition, DO generates the parity bits using xor and assigns to each hard drive (HD) in CS, which assistants to TDM in public auditing. Second, how to identify the error in the stored data and how to securely recover the error/missed data? Extension to the framework, the novel proposed data error identification and secure data recovery produce tags for installed HDs of CS using truth table and recover the altered/missed data via a authenticator, which is produced using xor function. Third, how to protect a valid user from revocation and, in case a user has revoked on merit basis, then how to securely access the stored data of it? This novel work has proposed three conditions to meet the validity of the valid user from revocation and securely generating the public-private key pairs to access the stored data of the revoked user securely from CS. Fourth, there is an efficient novel proposed dynamic operation scheme to insert, update, or delete the stored data at CS without regenerating the signatures, hashes, and tags for the whole stored data in cloud. The security analysis and the performance evaluation of the proposed solutions are provably efficient and secure with reduced communication costs.
引用
收藏
页码:3090 / 3107
页数:18
相关论文
共 50 条
  • [31] Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks
    Li, Song
    Cui, Jie
    Zhong, Hong
    Liu, Lu
    SENSORS, 2017, 17 (05)
  • [32] Public Auditing for Shared Data in Cloud Storage with an Effective User Dismissal
    Samundiswary, S.
    Dongre, Nilima
    COMPUTING, COMMUNICATION AND SIGNAL PROCESSING, ICCASP 2018, 2019, 810 : 97 - 104
  • [33] Secure Public-Auditing Cloud Storage Enabling Data Dynamics in the Standard Model
    Ma, Mingxiao
    Weber, Jos
    van den Berg, Jan
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 170 - 175
  • [34] CRUPA: collusion resistant user revocable public auditing of shared data in cloud
    Geeta C. Mara
    Usharani Rathod
    Shreyas Raju R. G.
    Raghavendra S.
    Rajkumar Buyya
    Venugopal K. R.
    S. S. Iyengar
    L. M. Patnaik
    Journal of Cloud Computing, 9
  • [35] CRUPA: collusion resistant user revocable public auditing of shared data in cloud
    Mara, Geeta C.
    Rathod, Usharani
    Raju, Shreyas R. G.
    Raghavendra, S.
    Buyya, Rajkumar
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [36] Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
    Yang, Guangyang
    Yu, Jia
    Shen, Wenting
    Su, Qianqian
    Fu, Zhangjie
    Hao, Rong
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 113 : 130 - 139
  • [37] Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation
    Qi, Yining
    Luo, Yubo
    Huang, Yongfeng
    Li, Xing
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 45 (01): : 183 - 199
  • [38] Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving
    Yan, Hao
    Gui, Wenming
    IEEE ACCESS, 2021, 9 (09): : 45822 - 45831
  • [39] Generic user revocation systems for attribute-based encryption in cloud storage
    Chen, Genlang
    Xu, Zhiqian
    Jiang, Hai
    Li, Kuan-ching
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (11) : 1362 - 1384
  • [40] Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach
    Mishra, Rahul
    Ramesh, Dharavath
    Kanhere, Salil S.
    Edla, Damodar Reddy
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2023, 14 (03)