首页 » 文章 » 文章详细信息
Security and Communication Networks Volume 2019 ,2019-03-03
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment
Research Article
Wenting Shen 1 Jing Qin 1 , 2 Jixin Ma 3
Show affiliations
DOI:10.1155/2019/8275074
Received 2018-10-25, accepted for publication 2019-01-02, Published 2019-01-02
PDF
摘要

Cloud storage auditing allows the users to store their data to the cloud with a guarantee that the data integrity can be efficiently checked. In order to release the user from the burden of generating data signatures, the proxy with a valid warrant is introduced to help the user process data in lightweight cloud storage auditing schemes. However, the proxy might be revoked or the proxy’s warrant might expire. These problems are common and essential in real-world applications, but they are not considered and solved in existing lightweight cloud storage auditing schemes. In this paper, we propose a lightweight identity-based cloud storage auditing scheme supporting proxy update, which not only reduces the user’s computation overhead but also makes the revoked proxy or the expired proxy unable to process data on behalf of the user any more. The signatures generated by the revoked proxy or the expired proxy can still be used to verify data integrity. Furthermore, our scheme also supports workload-based payment for the proxy. The security proof and the performance analysis indicate that our scheme is secure and efficient.

授权许可

Copyright © 2019 Wenting Shen et al. 2019
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

通讯作者

Jing Qin.School of Mathematics, Shandong University, Shandong 250100, China, sdu.edu.cn;State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China, cas.cn.qinjing@sdu.edu.cn

推荐引用方式

Wenting Shen,Jing Qin,Jixin Ma. A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment. Security and Communication Networks ,Vol.2019(2019)

您觉得这篇文章对您有帮助吗?
分享和收藏
0

是否收藏?

参考文献
[1] W. Shen, J. Yu, H. Xia, H. Zhang. et al.(2017). Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. Journal of Network and Computer Applications.82:56-64. DOI: 10.1109/MIC.2012.14.
[2] A. Fu, S. Yu, Y. Zhang, H. Wang. et al.(2017). NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Transactions on Big Data. DOI: 10.1109/MIC.2012.14.
[3] The gnu multiple precision arithmetic library (gmp). . DOI: 10.1109/MIC.2012.14.
[4] B. Lynn. (2015). The Pairing-Based Cryptographic Library. DOI: 10.1109/MIC.2012.14.
[5] H. Wang, Q. Wu, B. Qin, J. Domingo-Ferrer. et al.(2014). Identity-based remote data possession checking in public clouds. IET Information Security.8(2):114-121. DOI: 10.1109/MIC.2012.14.
[6] B. Wang, H. Li, M. Li. Privacy-preserving public auditing for shared cloud data supporting group dynamics. :1946-1950. DOI: 10.1109/MIC.2012.14.
[7] J. Li, L. Zhang, J. K. Liu, H. Qian. et al.(2016). Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Transactions on Information Forensics and Security.11(11):2572-2583. DOI: 10.1109/MIC.2012.14.
[8] Y. Wang, Q. Wu, B. Qin, S. Tang. et al.(2017). Online/offline provable data possession. IEEE Transactions on Information Forensics and Security.12(5):1182-1194. DOI: 10.1109/MIC.2012.14.
[9] G. Ateniese, R. Burns, R. Curtmola, J. Herring. et al.Provable data possession at untrusted stores. :598-609. DOI: 10.1109/MIC.2012.14.
[10] G. Yang, J. Yu, W. Shen, Q. Su. et al.(2016). Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. The Journal of Systems and Software.113:130-139. DOI: 10.1109/MIC.2012.14.
[11] K. Ren, C. Wang, Q. Wang. (2012). Security challenges for the public cloud. IEEE Internet Computing.16(1):69-73. DOI: 10.1109/MIC.2012.14.
[12] C. Wang, S. S. M. Chow, Q. Wang, K. Ren. et al.(2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers.62(2):362-375. DOI: 10.1109/MIC.2012.14.
[13] H. Tian, Y. Chen, C.-C. Chang, H. Jiang. et al.(2017). Dynamic-hash-table based public auditing for secure cloud storage. IEEE Transactions on Services Computing.10(5):701-714. DOI: 10.1109/MIC.2012.14.
[14] B. Wang, S. S. M. Chow, M. Li, H. Li. et al.Storing shared data on the cloud via security-mediator. :124-133. DOI: 10.1109/MIC.2012.14.
[15] C. Liu, J. Chen, L. T. Yang, X. Zhang. et al.(2014). Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Transactions on Parallel and Distributed Systems.25(9):2234-2244. DOI: 10.1109/MIC.2012.14.
[16] Y. Wang, Q. Wu, B. Qin, W. Shi. et al.(2017). Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Transactions on Information Forensics and Security.12(4):940-952. DOI: 10.1109/MIC.2012.14.
[17] Y. Li, Y. Yu, B. Yang, G. Min. et al.(2018). Privacy preserving cloud data auditing with efficient key update. Future Generation Computer Systems.78:789-798. DOI: 10.1109/MIC.2012.14.
[18] A. Juels, B. S. Kaliski. Pors: proofs of retrievability for large files. :584-597. DOI: 10.1109/MIC.2012.14.
[19] Y. Zhang, J. Yu, R. Hao, C. Wang. et al.(2018). Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Transactions on Dependable and Secure Computing. DOI: 10.1109/MIC.2012.14.
[20] Q.-A. Wang, C. Wang, K. Ren, W.-J. Lou. et al.(2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems.22(5):847-859. DOI: 10.1109/MIC.2012.14.
[21] W. Shen, J. Qin, J. Yu, R. Hao. et al.(2018). Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security.14(2):331-346. DOI: 10.1109/MIC.2012.14.
[22] Y. Yu, M. H. Au, G. Ateniese, X. Huang. et al.(2017). Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security.12(4):767-778. DOI: 10.1109/MIC.2012.14.
[23] H. Wang. (2013). Proxy provable data possession in public clouds. IEEE Transactions on Services Computing.6(4):551-559. DOI: 10.1109/MIC.2012.14.
[24] H. Shacham, B. Waters. (2013). Compact proofs of retrievability. Journal of Cryptology. The Journal of the International Association for Cryptologic Research.26(3):442-483. DOI: 10.1109/MIC.2012.14.
[25] Y. Li, Y. Yu, G. Min, W. Susilo. et al.(2019). Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Transactions on Dependable and Secure Computing.16(1):72-83. DOI: 10.1109/MIC.2012.14.
[26] A. Yang, J. Xu, J. Weng, J. Zhou. et al.(2018). Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage. IEEE Transactions on Cloud Computing:1-1. DOI: 10.1109/MIC.2012.14.
[27] J. Yu, R. Hao, H. Xia, H. Zhang. et al.(2018). Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction. Information Sciences.442/443:158-172. DOI: 10.1109/MIC.2012.14.
[28] H. Wang, D. He, S. Tang. (2016). Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Transactions on Information Forensics and Security.11(6):1165-1176. DOI: 10.1109/MIC.2012.14.
[29] Y. Zhang, H. Zhang, R. Hao, J. Yu. et al.(2018). Authorized identity-based public cloud storage auditing scheme with hierarchical structure for large-scale user groups. China Communications.15(11):111-121. DOI: 10.1109/MIC.2012.14.
[30] W. Shen, G. Yang, J. Yu, H. Zhang. et al.(2017). Remote data possession checking with privacy-preserving authenticators for cloud storage. Future Generation Computer Systems.76:136-145. DOI: 10.1109/MIC.2012.14.
[31] M. Sookhak, A. Gani, M. K. Khan, R. Buyya. et al.(2017). Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences.380:101-116. DOI: 10.1109/MIC.2012.14.
[32] J. Shen, J. Shen, X. Chen, X. Huang. et al.(2017). An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Transactions on Information Forensics and Security.12(10):2402-2415. DOI: 10.1109/MIC.2012.14.
[33] B. Wang, B. Li, H. Li. (2015). Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Transactions on Services Computing.8(1):92-106. DOI: 10.1109/MIC.2012.14.
[34] J. Yu, H. Wang. (2017). Strong key-exposure resilient auditing for secure cloud storage. IEEE Transactions on Information Forensics and Security.12(8):1931-1940. DOI: 10.1109/MIC.2012.14.
文献评价指标
浏览 125次
下载全文 30次
评分次数 0次
用户评分 0.0分
分享 0次