Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage

被引:0
|
作者
Guo, Hua [1 ]
Ma, Fangchao [2 ]
Li, Zhoujun [1 ]
Xia, Chunhe [2 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[2] Beihang Univ, Beijing Key Lab Network Technol, Sch Comp Sci & Engn, Beijing 100191, Peoples R China
来源
关键词
Public auditing; Shared data; Cloud storage; User revocation; Key-exposure protection;
D O I
10.1007/978-3-319-27998-5_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud data storage, more and more data owners are choosing to store their data in the Cloud and share them as a group. To protect integrity of sharing data, data are signed before they are stored on the cloud. When a user is revoked from the group, the revoked user's signature can be converted to the existing group member's signature by the cloud to preserve the revocation's efficiency. Accordingly, the public auditing should be done by the third party auditor using the existing group member's public key. As a basic secure requirement, the cloud sever should not know the existing group member's private key even if he obtains the revoked user's private key. In this paper, we propose a new public auditing protocol in which a public verifier is always able to audit the integrity of shared data even if some part of shared data has been re-signed by the cloud. By integrating the proxy re-signature with random masking technique, the new public auditing protocol satisfies the basic secure requirement. In addition, we prove the security of the new protocol, and finally compare it with other existing public auditing protocols and show that the new mechanism provides a good key-exposure protection for the existed public auditing protocol for shared data without losing the communication and computation efficiency.
引用
收藏
页码:127 / 136
页数:10
相关论文
共 50 条
  • [1] Enabling Cloud Storage Auditing With Key-Exposure Resistance
    Yu, Jia
    Ren, Kui
    Wang, Cong
    Varadharajan, Vijay
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1167 - 1179
  • [2] Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
    Yu, Jia
    Wang, Huaqun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1931 - 1940
  • [3] Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience
    Nithya, S. Mary Virgil
    Uthariaraj, V. Rhymend
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [4] Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
    Zhang, Xiaojun
    Wang, Huaxiong
    Xu, Chunxiang
    [J]. INFORMATION SCIENCES, 2019, 472 : 223 - 234
  • [5] Online/offline remote data auditing with strong key-exposure resilience for cloud storage
    Gan, Qingqing
    Wang, Xiaoming
    Huang, Daxin
    Li, Jianwei
    Wang, Changji
    Liu, Zhen
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [6] Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
    Hu, Chengyu
    Xu, Yuqin
    Liu, Pengtao
    Yu, Jia
    Guo, Shanqing
    Zhao, Minghao
    [J]. INFORMATION SCIENCES, 2020, 520 : 15 - 30
  • [7] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [8] Public Auditing for shared data in cloud with safe user revocation
    Samundiswary, S.
    Dongre, Nilima M.
    [J]. 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 53 - 57
  • [9] Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2904 - 2912
  • [10] Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud
    Ullah, Fasee
    Pun, Chi-Man
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (03) : 3090 - 3107