Skip to main content
Erschienen in: Cluster Computing 2/2020

06.11.2019

An identity-based online/offline secure cloud storage auditing scheme

verfasst von: Reyhaneh Rabaninejad, Maryam Rajabzadeh Asaar, Mahmoud Ahmadian Attari, Mohammad Reza Aref

Erschienen in: Cluster Computing | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud storage has significantly reduced data management costs for data owners. However, loss of physical control over the data after outsourcing, triggers some security concerns such as data integrity. Provable Data Possession (PDP) protocols, enable data owners to audit the integrity of their outsourced data without the need to retrieve the file from cloud server. However, most existing PDP schemes require resource-constrained users to perform costly operations for generating metadata on file blocks. In online/offline PDP mechanisms introduced most recently, the user’s computation is divided into online/offline phases, where the costly operations are allowed to be carried out in the offline phase. The users only require to perform lightweight operations in the real-time online phase. In this paper, we propose an identity-based (ID-based) online/offline PDP protocol which not only has lightweight computations at the users side, but also removes the complex certificate management/verification costs caused by expensive Public Key Infrastructure. The proposed scheme is based on an ID-based online/offline signature designed in this paper. The protocol is proven to be secure against a malicious cloud server in the random oracle model. We also prove the privacy preserving property of the protocol in the sense that it leaks no information of the outsourced data to the public verifier during the protocol execution. Moreover, our mechanism supports batch verification of multiple auditing tasks and fully dynamic data operations, efficiently. Experimental results demonstrate fine efficiency of our scheme in comparison to the recent proposals.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security, ACM 2007, pp. 598–609. ACM. Alexandria, Virginia, USA, Oct 29–Nov 02 (2007) Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security, ACM 2007, pp. 598–609. ACM. Alexandria, Virginia, USA, Oct 29–Nov 02 (2007)
3.
Zurück zum Zitat Juels, A., Kaliski, B. S. Jr: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on computer and communications security, pp. 584–597ACM (2007) Juels, A., Kaliski, B. S. Jr: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on computer and communications security, pp. 584–597ACM (2007)
4.
Zurück zum Zitat Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the international conference on the theory and application of cryptology and information security, pp. 90–107. Springer (2008) Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the international conference on the theory and application of cryptology and information security, pp. 90–107. Springer (2008)
5.
Zurück zum Zitat Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Proceedings of the advances in cryptology– ASIACRYPT 2001, vol. 2248, pp. 514–532. Springer, Gold Coast, Australia, Dec 9–13 (2001) Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Proceedings of the advances in cryptology– ASIACRYPT 2001, vol. 2248, pp. 514–532. Springer, Gold Coast, Australia, Dec 9–13 (2001)
6.
Zurück zum Zitat Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
7.
Zurück zum Zitat Yuan, J., Yu, S.: Pcpor: public and constant-cost proofs of retrievability in cloud. J. Comput. Secur. 23(3), 403–425 (2015)CrossRef Yuan, J., Yu, S.: Pcpor: public and constant-cost proofs of retrievability in cloud. J. Comput. Secur. 23(3), 403–425 (2015)CrossRef
8.
Zurück zum Zitat Liu, J., Huang, K., Rong, H., Wang, H., Xian, M.: Privacy-preserving public auditing for regenerating-code-based cloud storage. IEEE Trans. Inf. Forensics Secur. 10(7), 1513–1528 (2015)CrossRef Liu, J., Huang, K., Rong, H., Wang, H., Xian, M.: Privacy-preserving public auditing for regenerating-code-based cloud storage. IEEE Trans. Inf. Forensics Secur. 10(7), 1513–1528 (2015)CrossRef
9.
Zurück zum Zitat Wu, L., Wang, J., Kumar, N., He, D.: Secure public data auditing scheme for cloud storage in smart city. Pers. Ubiquit. Comput. 21(5), 949–962 (2017)CrossRef Wu, L., Wang, J., Kumar, N., He, D.: Secure public data auditing scheme for cloud storage in smart city. Pers. Ubiquit. Comput. 21(5), 949–962 (2017)CrossRef
10.
Zurück zum Zitat Cash, D., Küpçü, A., Wichs, D.: Dynamic proofs of retrievability via oblivious ram. J. Cryptol. 30(1), 22–57 (2017)MathSciNetCrossRef Cash, D., Küpçü, A., Wichs, D.: Dynamic proofs of retrievability via oblivious ram. J. Cryptol. 30(1), 22–57 (2017)MathSciNetCrossRef
11.
Zurück zum Zitat Zang, L., Yu, Y., Xue, L., Li, Y., Ding, Y., Tao, X.: Improved dynamic remote data auditing protocol for smart city security. Pers. Ubiquit. Comput. 21(5), 911–921 (2017)CrossRef Zang, L., Yu, Y., Xue, L., Li, Y., Ding, Y., Tao, X.: Improved dynamic remote data auditing protocol for smart city security. Pers. Ubiquit. Comput. 21(5), 911–921 (2017)CrossRef
12.
Zurück zum Zitat Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)CrossRef Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)CrossRef
13.
Zurück zum Zitat Li, Y., Yu, Y., Yang, B., Min, G., Wu, H.: Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78, 789–798 (2018)CrossRef Li, Y., Yu, Y., Yang, B., Min, G., Wu, H.: Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78, 789–798 (2018)CrossRef
14.
Zurück zum Zitat Yang, C.-Y., Huang, C.-T., Wang, Y.-P., Chen, Y.-W., Wang, S.-J.: File changes with security proof stored in cloud service systems. Pers. Ubiquit. Comput. 22(1), 45–53 (2018)CrossRef Yang, C.-Y., Huang, C.-T., Wang, Y.-P., Chen, Y.-W., Wang, S.-J.: File changes with security proof stored in cloud service systems. Pers. Ubiquit. Comput. 22(1), 45–53 (2018)CrossRef
16.
Zurück zum Zitat Rabaninejad, R., Attari, M.A., Asaar, M.R., Aref, M.R.: Comments on a lightweight cloud auditing scheme: Security analysis and improvement J. Netw. Comput. Appl. 139, 49–56 (2019)CrossRef Rabaninejad, R., Attari, M.A., Asaar, M.R., Aref, M.R.: Comments on a lightweight cloud auditing scheme: Security analysis and improvement J. Netw. Comput. Appl. 139, 49–56 (2019)CrossRef
17.
Zurück zum Zitat Zhao, J., Xu, C., Li, F., Zhang, W.: Identity-based public verification with privacy-preserving for data storage security in cloud computing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96(12), 2709–2716 (2013)CrossRef Zhao, J., Xu, C., Li, F., Zhang, W.: Identity-based public verification with privacy-preserving for data storage security in cloud computing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96(12), 2709–2716 (2013)CrossRef
18.
Zurück zum Zitat Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Proceedings of the international workshop on public key cryptography, pp. 257–273. Springer (2006) Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Proceedings of the international workshop on public key cryptography, pp. 257–273. Springer (2006)
19.
Zurück zum Zitat Wang, H., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based remote data possession checking in public clouds. IET Inf. Secur. 8(2), 114–121 (2013)CrossRef Wang, H., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based remote data possession checking in public clouds. IET Inf. Secur. 8(2), 114–121 (2013)CrossRef
20.
Zurück zum Zitat Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015)CrossRef Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015)CrossRef
21.
Zurück zum Zitat Yu, Y., Xue, L., Au, M.H., Susilo, W., Ni, J., Zhang, Y., Vasilakos, A.V., Shen, J.: Cloud data integrity checking with an identity-based auditing mechanism from rsa. Future Gener. Comput. Syst. 62, 85–91 (2016)CrossRef Yu, Y., Xue, L., Au, M.H., Susilo, W., Ni, J., Zhang, Y., Vasilakos, A.V., Shen, J.: Cloud data integrity checking with an identity-based auditing mechanism from rsa. Future Gener. Comput. Syst. 62, 85–91 (2016)CrossRef
22.
Zurück zum Zitat Yu, Y., Au, M.H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., Min, G.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)CrossRef Yu, Y., Au, M.H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., Min, G.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)CrossRef
23.
Zurück zum Zitat Wang, Y., Wu, Q., Wong, D. S., Qin, B., Chow, S. S., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Proceedings of the European symposium on research in computer security, pp. 326–343, Springer (2014) Wang, Y., Wu, Q., Wong, D. S., Qin, B., Chow, S. S., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Proceedings of the European symposium on research in computer security, pp. 326–343, Springer (2014)
24.
Zurück zum Zitat Shen, W., Yu, J., Xia, H., Zhang, H., Lu, X., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)CrossRef Shen, W., Yu, J., Xia, H., Zhang, H., Lu, X., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)CrossRef
25.
Zurück zum Zitat Li, J., Zhang, L., Liu, J.K., Qian, H., Dong, Z.: Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11(11), 2572–2583 (2016)CrossRef Li, J., Zhang, L., Liu, J.K., Qian, H., Dong, Z.: Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11(11), 2572–2583 (2016)CrossRef
26.
Zurück zum Zitat Wang, Y., Wu, Q., Qin, B., Tang, S., Susilo, W.: Online/offline provable data possession. IEEE Trans. Inf. Forensics Secur. 12(5), 1182–1194 (2017)CrossRef Wang, Y., Wu, Q., Qin, B., Tang, S., Susilo, W.: Online/offline provable data possession. IEEE Trans. Inf. Forensics Secur. 12(5), 1182–1194 (2017)CrossRef
27.
Zurück zum Zitat Merkle, R.C.: Protocols for public key cryptosystems. In: Proceedings of the IEEE symposium on security and privacy, pp. 122–122, IEEE (1980) Merkle, R.C.: Protocols for public key cryptosystems. In: Proceedings of the IEEE symposium on security and privacy, pp. 122–122, IEEE (1980)
28.
Zurück zum Zitat Bao, F., Deng, R. H., Zhu, H.: Variations of diffie-hellman problem. In: Proceedings of the international conference on information and communications security. pp. 301–312, Springer (2003) Bao, F., Deng, R. H., Zhu, H.: Variations of diffie-hellman problem. In: Proceedings of the international conference on information and communications security. pp. 301–312, Springer (2003)
29.
Zurück zum Zitat Krawczyk, H., Rabin, T.: Chameleon signatures. In: Proceedings of the symposium on network and distributed systems security (NDSS’ 00), pp. 143–154, Internet Society (2000) Krawczyk, H., Rabin, T.: Chameleon signatures. In: Proceedings of the symposium on network and distributed systems security (NDSS’ 00), pp. 143–154, Internet Society (2000)
30.
Zurück zum Zitat Yu, Y., Ni, J., Au, M.H., Mu, Y., Wang, B., Li, H.: Comments on a public auditing mechanism for shared cloud data service. IEEE Trans. Serv. Comput. 8(6), 998–999 (2015)CrossRef Yu, Y., Ni, J., Au, M.H., Mu, Y., Wang, B., Li, H.: Comments on a public auditing mechanism for shared cloud data service. IEEE Trans. Serv. Comput. 8(6), 998–999 (2015)CrossRef
31.
Zurück zum Zitat Hess, F.: Efficient identity based signature schemes based on pairings. In: Proceedings of the international workshop on selected areas in cryptography, pp. 310–324. Springer (2002) Hess, F.: Efficient identity based signature schemes based on pairings. In: Proceedings of the international workshop on selected areas in cryptography, pp. 310–324. Springer (2002)
32.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the IEEE Infocom 2010, pp. 1–9. IEEE (2010) Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the IEEE Infocom 2010, pp. 1–9. IEEE (2010)
Metadaten
Titel
An identity-based online/offline secure cloud storage auditing scheme
verfasst von
Reyhaneh Rabaninejad
Maryam Rajabzadeh Asaar
Mahmoud Ahmadian Attari
Mohammad Reza Aref
Publikationsdatum
06.11.2019
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 2/2020
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-019-03000-5

Weitere Artikel der Ausgabe 2/2020

Cluster Computing 2/2020 Zur Ausgabe

Premium Partner