Threshold privacy-preserving cloud auditing with multiple uploaders

被引:0
|
作者
Ge Wu
Yi Mu
Willy Susilo
Fuchun Guo
Futai Zhang
机构
[1] University of Wollongong,Institute of Cybersecurity and Cryptology, School of Computing and Information Technology
[2] Fujian Normal University,Fujian Provincial Key Laboratory of Network Security and Cryptography
[3] Nanjing Normal University,School of Computer Science and Technology
关键词
Cloud auditing; Multiple uploaders; Identity privacy; Threshold cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Data integrity is a critical security issue in cloud storage. The data integrity checking schemes by a third-party auditor (TPA) have attracted a lot of attention. Sharing data among multiple users (uploaders) is an attractive feature of cloud storage. Considering the scenario of multiple uploaders, privacy-preserving cloud auditing makes it possible for the TPA to publicly verify the data integrity while guarantees that it cannot learn the identity of the data uploader. In this paper, we propose a (t, n)-threshold privacy-preserving auditing scheme. Every user could generate a tag piece of a message from the tag generation algorithm individually. To respond a challenge from the TPA, the server needs at least t tag pieces from different users among all n users. Our scheme does not resort to ring signature or group signature techniques. The tag of a message consists of only one element, which is independent of the number of the users within the group. Therefore, the efficiency of tag generation and auditing of our scheme is compatible with an efficient construction (Wu et al., in: International conference on information security practice and experience ISPEC 2016, Springer, New York, 2016). We use the pairing-based cryptography library (PBC library-0.5.14) to implement the scheme and compare both the computation and transmission cost of our scheme with some existing schemes.
引用
收藏
页码:321 / 331
页数:10
相关论文
共 50 条
  • [41] PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing
    Xu, Yan
    Ding, Long
    Cui, Jie
    Zhong, Hong
    Yu, Jia
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3730 - 3739
  • [42] Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems
    Xiang, Wenyu
    Zhao, Jie
    Huang, Hejiao
    Zhang, Xiaojun
    Jiang, Zoe Lin
    He, Daojing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT II, 2024, 14488 : 292 - 310
  • [43] Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wu, Yulin
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Peng
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 562 - 567
  • [44] Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage
    Zhao, Yubo
    Chang, Jinyong
    COMPUTER NETWORKS, 2022, 216
  • [45] Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage
    Yu, Yong
    Mu, Yi
    Ni, Jianbing
    Deng, Jiang
    Huang, Ke
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 28 - 40
  • [46] Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data
    Shen, Wenting
    Yu, Jia
    Yang, Guangyang
    Zhang, Yue
    Fu, Zhangjie
    Hao, Rong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3319 - 3338
  • [47] Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing
    Zhao, Pu
    Yu, Jia
    Zhang, Hanlin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (03) : 635 - 650
  • [48] Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage
    Guan, Xuening
    Chang, Jinyong
    Zhang, Wei
    COMPUTER COMMUNICATIONS, 2024, 224 : 285 - 301
  • [49] Privacy preserving auditing for shared data in cloud
    Ghutugade, Kalyani B.
    Patil, G. A.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 300 - 305
  • [50] Threshold Signature for Privacy-Preserving Blockchain
    Ricci, Sara
    Dzurenda, Petr
    Casanova-Marques, Raul
    Cika, Petr
    BUSINESS PROCESS MANAGEMENT: BLOCKCHAIN, ROBOTIC PROCESS AUTOMATION, AND CENTRAL AND EASTERN EUROPE FORUM, 2022, 459 : 100 - 115