Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud

被引:3
|
作者
Ullah, Fasee [1 ,2 ]
Pun, Chi-Man [1 ]
机构
[1] Univ Macau, Dept Comp & Informat Sci, Taipa, Macao, Peoples R China
[2] Sarhad Univ Sci & Informat Technol, Peshawar 25000, Pakistan
关键词
Cloud computing; Security; Time division multiplexing; Organizations; Costs; Data privacy; Servers; Auditing; authenticator; dynamics; error identification; parity bits; privacy; recovery; tag; user revocation; BIG DATA-STORAGE; SHARED DATA; PROTOCOL;
D O I
10.1109/TCSS.2022.3165213
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The significance of the cloud enables the data owners (DOs) to store data remotely in cloud server (CS). The external and internal attacks on the stored data at CS can deliberately remove data. Furthermore, the CS removes the stored data to make empty location for the user's upcoming new data. However, it is a legal expectation of DOs to know whether their data are correctly stored or altered in CS. In this article, we propose a novel privacy-aware and hash-parity-bits-based public auditing (PA-HPPA) framework to secure full data, left half of the data, and the right half of the data, generated by a DO. DO generates two private key pairs with the assistance of a virtual key and a user ID (IP). The virtual key is the sequence number of DO who is registered and provided by the trusted data manager (TDM) while IP is the sequence number of DO working in an organization. Subsequently, DO blinds the categorized data and generates their signatures and hashes. In addition, DO generates the parity bits using xor and assigns to each hard drive (HD) in CS, which assistants to TDM in public auditing. Second, how to identify the error in the stored data and how to securely recover the error/missed data? Extension to the framework, the novel proposed data error identification and secure data recovery produce tags for installed HDs of CS using truth table and recover the altered/missed data via a authenticator, which is produced using xor function. Third, how to protect a valid user from revocation and, in case a user has revoked on merit basis, then how to securely access the stored data of it? This novel work has proposed three conditions to meet the validity of the valid user from revocation and securely generating the public-private key pairs to access the stored data of the revoked user securely from CS. Fourth, there is an efficient novel proposed dynamic operation scheme to insert, update, or delete the stored data at CS without regenerating the signatures, hashes, and tags for the whole stored data in cloud. The security analysis and the performance evaluation of the proposed solutions are provably efficient and secure with reduced communication costs.
引用
收藏
页码:3090 / 3107
页数:18
相关论文
共 50 条
  • [41] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang Chen
    Zhiqian Xu
    Hai Jiang
    Kuan-ching Li
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1362 - 1384
  • [42] A Cloud-Based Access Control Scheme with User Revocation and Attribute Update
    Zhang, Peng
    Chen, Zehong
    Liang, Kaitai
    Wang, Shulan
    Wang, Ting
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 525 - 540
  • [43] Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing
    Xu, Zhiqian
    Martin, Keith M.
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 358 - 365
  • [44] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang CHEN
    Zhiqian XU
    Hai JIANG
    Kuan-ching LI
    FrontiersofInformationTechnology&ElectronicEngineering, 2018, 19 (11) : 1362 - 1384
  • [45] New group user based privacy preserving cloud auditing protocol
    Zhang, Jindan
    Wang, Baocang
    Wang, Xu An
    Wang, Han
    Xiao, Shuai
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 106 : 585 - 594
  • [46] Blockchain-Based Decentralized Public Auditing for Cloud Storage
    Shu, Jiangang
    Zou, Xing
    Jia, Xiaohua
    Zhang, Weizhe
    Xie, Ruitao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2366 - 2380
  • [47] Ensure Cloud Storage Correctness Based on Public Auditing Mechanism
    Priya, K.
    Gunavathi, I
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1468 - 1472
  • [48] Public Auditing for Network Coding Based Secure Cloud Storage
    Liu, Xiang
    Huang, Jie
    Zong, Guowen
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 713 - 720
  • [49] Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation
    Mishra, Rahul
    Ramesh, Dharavath
    Edla, Damodar Reddy
    Trivedi, Munesh Chandra
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (05): : 3103 - 3127
  • [50] Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation
    Rahul Mishra
    Dharavath Ramesh
    Damodar Reddy Edla
    Munesh Chandra Trivedi
    Cluster Computing, 2022, 25 : 3103 - 3127