Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage

被引:0
|
作者
Huiying Hou
Jia Yu
Hanlin Zhang
Yan Xu
Rong Hao
机构
[1] Qingdao University,College of Computer Science and Technology
[2] Nanjing University of Posts and Telecommunications,Jiangsu Key Laboratory of Big Data Security & Intelligent Processing
[3] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering
[4] Anhui University,Co
来源
Cluster Computing | 2018年 / 21卷
关键词
Privacy; Public auditing; Cloud storage; Data deduplication;
D O I
暂无
中图分类号
学科分类号
摘要
The public cloud storage auditing with deduplication has been studied to assure the data integrity and improve the storage efficiency for cloud storage in recent years. The cloud, however, has to store the link between the file and its data owners to support the valid data downloading in previous schemes. From this file-owner link, the cloud server can identify which users own the same file. It might expose the sensitive relationship among data owners of this multi-owners file, which seriously harms the data owners’ privacy. To address this problem, we propose an identity-protected secure auditing and deduplicating data scheme in this paper. In the proposed scheme, the cloud cannot learn any useful information on the relationship of data owners. Different from existing schemes, the cloud does not need to store the file-owner link for supporting valid data downloading. Instead, when the user downloads the file, he only needs to anonymously submit a credential to the cloud, and can download the file only if this credential is valid. Except this main contribution, our scheme has the following advantages over existing schemes. First, the proposed scheme achieves the constant storage, that is, the storage space is fully independent of the number of the data owners possessing the same file. Second, the proposed scheme achieves the constant computation. Only the first uploader needs to generate the authenticator for each file block, while subsequent owners do not need to generate it any longer. As a result, our scheme greatly reduces the storage overhead of the cloud and the computation overhead of data owners. The security analysis and experimental results show that our scheme is secure and efficient.
引用
收藏
页码:1849 / 1863
页数:14
相关论文
共 50 条
  • [1] Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage
    Hou, Huiying
    Yu, Jia
    Zhang, Hanlin
    Xu, Yan
    Hao, Rong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (04): : 1849 - 1863
  • [2] Secure Auditing and Deduplicating Data in Cloud
    Li, Jingwei
    Li, Jin
    Xie, Dongqing
    Cai, Zhang
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2386 - 2396
  • [3] Enabling online/offline remote data auditing for secure cloud storage
    Gan, Qingqing
    Wang, Xiaoming
    Li, Jianwei
    Yan, Jiajun
    Li, Suyu
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3027 - 3041
  • [4] Enabling online/offline remote data auditing for secure cloud storage
    Qingqing Gan
    Xiaoming Wang
    Jianwei Li
    Jiajun Yan
    Suyu Li
    [J]. Cluster Computing, 2021, 24 : 3027 - 3041
  • [5] Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    Ma, Jixin
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1408 - 1421
  • [6] Secure Public-Auditing Cloud Storage Enabling Data Dynamics in the Standard Model
    Ma, Mingxiao
    Weber, Jos
    van den Berg, Jan
    [J]. 2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 170 - 175
  • [7] Enabling Cloud Storage Auditing With Key-Exposure Resistance
    Yu, Jia
    Ren, Kui
    Wang, Cong
    Varadharajan, Vijay
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1167 - 1179
  • [8] A Novel approach to Secure Cloud Data Storage and Dynamic Data Auditing in a Cloud
    Brindha, K.
    Jeyanthi, N.
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [9] Towards an analysis of data accountability and auditing for secure cloud data storage
    Prassanna, J.
    Punitha, K.
    Neelanarayanan, V
    [J]. BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 543 - 550
  • [10] A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
    Tian, Junfeng
    Jing, Xuan
    [J]. IEEE ACCESS, 2019, 7 : 68071 - 68082