An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme

被引:0
|
作者
Kiraz, Mehmet Sabir [1 ]
Sertkaya, Isa [1 ]
Uzunkol, Osmanbey [1 ]
机构
[1] TUBITAK BILGEM, Math & Computat Sci, Kocaeli, Turkey
关键词
Data storage; public auditability; privacy preserving; message recoverable signatures; bilinear maps; SECURE; PAIRINGS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the most important benefits of public cloud storage is outsourcing of management and maintenance with easy accessibility and retrievability over the internet. However, outsourcing data on the cloud brings new challenges such as integrity verification and privacy of data. More concretely, once the users outsource their data on the cloud they have no longer physical control over the data and this leads to the integrity protection issue. Hence, it is crucial to guarantee proof of data storage and integrity of the outsourced data. Several pairing-based auditing solutions have been proposed utilizing the Boneh-Lynn-Shacham (BLS) short signatures. They basically provide a desirable and efficient property of non-repudiation protocols. In this work, we propose the first ID-based privacy-preserving public auditing scheme with message recoverable signatures. Because of message recoverable auditing scheme, the message itself is implicitly included during the verification step that was not possible in previously proposed auditing schemes. Furthermore, we point out that the algorithm suites of existing schemes is either insecure or very inefficient due to the choice of the underlying bilinear map and its baseline parameter selections. We show that our scheme is more efficient than the recently proposed auditing schemes based on BLS like short signatures.
引用
收藏
页码:117 / 124
页数:8
相关论文
共 50 条
  • [1] ID-based sanitizable signature data integrity auditing scheme with privacy-preserving
    Liu, Zhenpeng
    Ren, Lele
    Li, Ruilin
    Liu, Qiannan
    Zhao, Yonggang
    [J]. COMPUTERS & SECURITY, 2022, 121
  • [2] A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPAN
    De Mulder, Yoni
    Wouters, Karel
    Preneel, Bart
    [J]. SOFSEM 2011: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2011, 6543 : 214 - 225
  • [3] Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization
    Lai, Jianchang
    Mu, Yi
    Guo, Fuchun
    Chen, Rongmao
    [J]. COMPUTER JOURNAL, 2017, 60 (12): : 1809 - 1821
  • [4] Privacy-preserving multireceiver ID-based encryption with provable security
    Tseng, Yuh-Min
    Huang, Yi-Hung
    Chang, Hui-Ju
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (07) : 1034 - 1050
  • [5] ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification
    Kang, Baoyuan
    Si, Lin
    Jiang, Hong
    Li, Chunqing
    Xie, Mingming
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [6] Privacy-preserving ID-based service provision in ubiquitous computing environments
    Lee, KM
    Lee, SH
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2004: OTM 2004 WORKSHOPS, PROCEEDINGS, 2004, 3292 : 21 - 22
  • [7] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713
  • [8] Incorporating privacy policy into an anonymity-based privacy-preserving ID-based service platform
    Lee, KM
    Lee, JH
    Chun, MG
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2005, 3681 : 1028 - 1035
  • [9] Source coding based recoverable privacy-preserving data aggregation scheme
    [J]. 1600, Beijing University of Posts and Telecommunications (39):
  • [10] Pseudo-ID-based public auditing with privacy-preserving for cloud storage
    Liu, Xue-Yan
    He, Xiao-Mei
    Lu, Ting-Ting
    [J]. Journal of Computers (Taiwan), 2020, 31 (03) : 154 - 167