Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage

被引:0
|
作者
Yu, Yong [1 ,2 ]
Mu, Yi [1 ]
Ni, Jianbing [2 ]
Deng, Jiang [2 ]
Huang, Ke [2 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
来源
NETWORK AND SYSTEM SECURITY | 2014年 / 8792卷
关键词
INTEGRITY VERIFICATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With mobile cloud storage, mobile users can enjoy the advantages of both mobile networks and cloud storage. However, a major concern of mobile users is how to guarantee the integrity of the remote data. Taking into account the mobility of mobile devices, in this paper, we propose an identity privacy-preserving public auditing protocol in mobile cloud storage for dynamic groups. In our proposal, a dynamic group key agreement is employed for key sharing among mobile users group and the idea of proxy re-signatures is borrowed to update tags efficiently when users in the group vary. In addition, the third party auditor (TPA) is able to verify the correctness of cloud data without the knowledge of mobile users' identities during the data auditing process. We also analyze the security of the proposed protocol.
引用
收藏
页码:28 / 40
页数:13
相关论文
共 50 条
  • [1] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [2] Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wu, Yulin
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Peng
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 562 - 567
  • [3] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713
  • [4] Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage
    Zhao, Xia'nan
    Wang, Dongsheng
    [J]. 2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 486 - 491
  • [5] PRIVACY-PRESERVING FOR A SECURE DATA STORAGE ON CLOUD USING PUBLIC AUDITING TECHNIQUE
    Suryawanshi, Akash Udaysinh
    Naveenkumar, J.
    [J]. IIOAB JOURNAL, 2018, 9 (02) : 111 - 115
  • [6] Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage
    Zhang, Yinghui
    Zhang, Tiantian
    Guo, Rui
    Xu, Shengmin
    Zheng, Dong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (11): : 5653 - 5672
  • [7] Privacy-Preserving Public Auditing for Shared Cloud Data With Secure Group Management
    Kim, Dongmin
    Kim, Kee Sung
    [J]. IEEE ACCESS, 2022, 10 : 44212 - 44223
  • [8] Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
    Tian, Hui
    Nan, Fulin
    Chang, Chin-Chen
    Huang, Yongfeng
    Lu, Jing
    Du, Yongqian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 127 : 59 - 69
  • [9] Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing
    Zhao, Pu
    Yu, Jia
    Zhang, Hanlin
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (03) : 635 - 650
  • [10] Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage
    Kang, Baoyuan
    Wang, Jiaqiang
    Shao, Dongyang
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017