Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

被引:2
|
作者
Zhang, Yinghui [1 ,2 ]
Zhang, Tiantian [1 ]
Guo, Rui [1 ]
Xu, Shengmin [3 ]
Zheng, Dong [1 ,2 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Secure Mobile Ctr, Singapore 178902, Singapore
关键词
Identity privacy preserving; traceability; public auditing; user revocation; cloud storage; EFFICIENT; SCHEME; SECURE;
D O I
10.3837/tiis.2019.11.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.
引用
收藏
页码:5653 / 5672
页数:20
相关论文
共 50 条
  • [1] Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage
    Yu, Yong
    Mu, Yi
    Ni, Jianbing
    Deng, Jiang
    Huang, Ke
    [J]. NETWORK AND SYSTEM SECURITY, 2014, 8792 : 28 - 40
  • [2] AN EFFICIENT, DYNAMIC, PRIVACY PRESERVING PUBLIC AUDITING METHOD ON UNTRUSTED CLOUD STORAGE
    Navajothi, R.
    Fenelon, S. Jean Adrien
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [3] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [4] Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wu, Yulin
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Peng
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 562 - 567
  • [5] Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage
    Kang, Baoyuan
    Wang, Jiaqiang
    Shao, Dongyang
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [6] Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage
    Gudeme, Jaya Rao
    Pasupuleti, Syamkumar
    Kandukuri, Ramesh
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 156 : 163 - 175
  • [7] Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage
    Zhao, Xia'nan
    Wang, Dongsheng
    [J]. 2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 486 - 491
  • [8] Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage
    Yan, Hao
    Liu, Yanan
    Zhang, Zheng
    Wang, Qian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] Survey on Security and Privacy Preserving Public Auditing for Content Storage in Cloud Environment
    Kumar, Arun K.
    Gnanadeepa, S.
    John, Hepzibha
    Janani, G. K.
    [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [10] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713