Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2016

01.09.2016

Efficient data integrity auditing for storage security in mobile health cloud

verfasst von: Yongjun Ren, Jian Shen, Yuhui Zheng, Jin Wang, Han-Chieh Chao

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud storage services can enable data owners to eliminate the need for the initial investment of expensive infrastructure setup and also minimize development and maintenance costs. Outsourcing the health data to e-health cloud storage server is very beneficial. Nonetheless, storing the health data on cloud servers also brings serious security challenges. In this paper, we propose a highly efficient data integrity auditing scheme for cloud storage for mobile health applications. The authentication tag for each data block generated by biosensor nodes is minimal in our scheme due to the use of hash operation. Moreover, in data integrity checking phase, message-locked encryption scheme is utilized to encrypt and transport the auditing information of the checked data blocks, which significantly reduces the required amount of calculation and communication resources. Compared with the conventional third party auditing schemes, the presented scheme speeds up the tag generation and tag checking process by more than one thousand times.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Generation Computer Systems 28(3):583–592CrossRef Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Generation Computer Systems 28(3):583–592CrossRef
2.
Zurück zum Zitat Yi F, Moon I, Lee Y (2014) A Multispectral Photon-Counting Double Random Phase Encoding Scheme for Image Authentication. Sensors 14(5):8877–8894CrossRef Yi F, Moon I, Lee Y (2014) A Multispectral Photon-Counting Double Random Phase Encoding Scheme for Image Authentication. Sensors 14(5):8877–8894CrossRef
3.
Zurück zum Zitat Bessani A, Correia M, Quaresma B, Andr F, Sousa P (2013) DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans Storage(TOS) 9(4):31–46 Bessani A, Correia M, Quaresma B, Andr F, Sousa P (2013) DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans Storage(TOS) 9(4):31–46
4.
Zurück zum Zitat Wang J, Yin Y, Zhang J, Lee S, Sherratt R (2013) Mobility Based Energy Efficient and Multi-sink Algorithms for Consumer Home Networks. IEEE Trans Consum Electron 59(1):77–84CrossRef Wang J, Yin Y, Zhang J, Lee S, Sherratt R (2013) Mobility Based Energy Efficient and Multi-sink Algorithms for Consumer Home Networks. IEEE Trans Consum Electron 59(1):77–84CrossRef
5.
Zurück zum Zitat Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings 14th ACM Conference Computer and Comm. Security(CCS ’07), pp 598–609 Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings 14th ACM Conference Computer and Comm. Security(CCS ’07), pp 598–609
6.
Zurück zum Zitat Juels A, Kaliski B (2007) PORs: Proofs of retrievability for large files. In: Proceedings 14th ACM Conference Computer and Committee Security(CCS ’07), pp 584–597 Juels A, Kaliski B (2007) PORs: Proofs of retrievability for large files. In: Proceedings 14th ACM Conference Computer and Committee Security(CCS ’07), pp 584–597
8.
Zurück zum Zitat Sookhak M, Talebian H, Ahmed E, Gani A (2014) A review on remote data auditing in single cloud server:Taxonomy and open issues. J Netw Comput Appl 43(8):121–141CrossRef Sookhak M, Talebian H, Ahmed E, Gani A (2014) A review on remote data auditing in single cloud server:Taxonomy and open issues. J Netw Comput Appl 43(8):121–141CrossRef
9.
Zurück zum Zitat Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings16th ACM Conference Computer and Committee Security(CCS ’09), pp 213–222 Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings16th ACM Conference Computer and Committee Security(CCS ’09), pp 213–222
10.
Zurück zum Zitat Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving Efficient Cloud Search Services:Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing. IEICE Trans Commun E98-B(1):190–200CrossRef Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving Efficient Cloud Search Services:Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing. IEICE Trans Commun E98-B(1):190–200CrossRef
11.
Zurück zum Zitat Shen J, Zheng W, Wang J, Zheng Y, Sun X (2013) An Efficient Verifiably Encrypted Signature from Weil Pairing. J Internet Technol 14(6):947–952 Shen J, Zheng W, Wang J, Zheng Y, Sun X (2013) An Efficient Verifiably Encrypted Signature from Weil Pairing. J Internet Technol 14(6):947–952
12.
Zurück zum Zitat Wang B, Li B, Li H (2013) Public auditing for shared data with efficient user revocation in the cloud. Proc IEEE INFOCOM:2904–2912 Wang B, Li B, Li H (2013) Public auditing for shared data with efficient user revocation in the cloud. Proc IEEE INFOCOM:2904–2912
13.
Zurück zum Zitat Naor M, Rothblum G (2005) The complexity of online memory checking. In: Proceedings 46th Ann IEEE Symp Foundations of Computer Science (FOCS 05), pp 573–584 Naor M, Rothblum G (2005) The complexity of online memory checking. In: Proceedings 46th Ann IEEE Symp Foundations of Computer Science (FOCS 05), pp 573–584
14.
Zurück zum Zitat Zheng Q, Xu S (2011) Fair and Dynamic Proofs of Retrievability. In: Proceedings 1th ACM conference on Data and application security and privacy(CODASPY 2011), pp 237–248 Zheng Q, Xu S (2011) Fair and Dynamic Proofs of Retrievability. In: Proceedings 1th ACM conference on Data and application security and privacy(CODASPY 2011), pp 237–248
15.
Zurück zum Zitat Ateniese G, Kamara S, Katz J (2009) Proofs of storage from homomorphic identification protocols, pp 319–333 Ateniese G, Kamara S, Katz J (2009) Proofs of storage from homomorphic identification protocols, pp 319–333
16.
Zurück zum Zitat Wang Q, Wang C, Li J, Ren K, Lou W (2011) Enabling public verifiability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859CrossRef Wang Q, Wang C, Li J, Ren K, Lou W (2011) Enabling public verifiability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859CrossRef
17.
Zurück zum Zitat Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. Proc.IEEE INFOCOM:525–533 Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. Proc.IEEE INFOCOM:525–533
18.
Zurück zum Zitat Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437CrossRef Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437CrossRef
19.
Zurück zum Zitat Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Knowl Data Eng 24(9):1717–1726 Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Knowl Data Eng 24(9):1717–1726
20.
Zurück zum Zitat Yuan J, Yu S (2013) Proofs of retrievability with public verifiability and constant communication cost in cloud. In: Proceedings the 2013 International Workshop on Security in Cloud Computing (Cloud Computing 2013), pp 19–26 Yuan J, Yu S (2013) Proofs of retrievability with public verifiability and constant communication cost in cloud. In: Proceedings the 2013 International Workshop on Security in Cloud Computing (Cloud Computing 2013), pp 19–26
21.
Zurück zum Zitat Abbas A, Khan S U (2014) A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds. IEEE J Biomed Health Inform 18(4):1431–1441MathSciNetCrossRef Abbas A, Khan S U (2014) A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds. IEEE J Biomed Health Inform 18(4):1431–1441MathSciNetCrossRef
22.
Zurück zum Zitat Ahuja S P, Mani S, Zambrano Z (2012) A survey of the state of cloud computing in healthcare. Netw Commun Technol 1(2):12C19 Ahuja S P, Mani S, Zambrano Z (2012) A survey of the state of cloud computing in healthcare. Netw Commun Technol 1(2):12C19
23.
Zurück zum Zitat Gu B, Sheng V S (2013) Feasibility and Finite Convergence Analysis for Accurate On-line –Support Vector Learning. IEEE Trans Neural Netw Learn Syst 24(8):1304–1315CrossRef Gu B, Sheng V S (2013) Feasibility and Finite Convergence Analysis for Accurate On-line –Support Vector Learning. IEEE Trans Neural Netw Learn Syst 24(8):1304–1315CrossRef
24.
Zurück zum Zitat Wang J, Zhang Z, Xia F, Yuan W, Lee Sungyoung (2013) An Energy Efficient Stable Election-based Routing Algorithm for Wireless Sensor Networks. Sensors 13(11):14301–14320CrossRef Wang J, Zhang Z, Xia F, Yuan W, Lee Sungyoung (2013) An Energy Efficient Stable Election-based Routing Algorithm for Wireless Sensor Networks. Sensors 13(11):14301–14320CrossRef
25.
Zurück zum Zitat Li J, Li X, Yang B, Sun X (2015) Segmentation-based Image Copy-move Forgery Detection Scheme. In: IEEE Transactions on Information Forensics and Security Li J, Li X, Yang B, Sun X (2015) Segmentation-based Image Copy-move Forgery Detection Scheme. In: IEEE Transactions on Information Forensics and Security
26.
Zurück zum Zitat Bellare M, Keelveedhi S, Ristenpart T (2013) Message-Locked Encryption and Secure Deduplication. In: Proceedings 32th Intl Conference Theory and Applications of Cryptographic Techniques: Advances in Cryptology(EUROCRYPT ’2013), pp 296–312 Bellare M, Keelveedhi S, Ristenpart T (2013) Message-Locked Encryption and Secure Deduplication. In: Proceedings 32th Intl Conference Theory and Applications of Cryptographic Techniques: Advances in Cryptology(EUROCRYPT ’2013), pp 296–312
Metadaten
Titel
Efficient data integrity auditing for storage security in mobile health cloud
verfasst von
Yongjun Ren
Jian Shen
Yuhui Zheng
Jin Wang
Han-Chieh Chao
Publikationsdatum
01.09.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2016
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-015-0346-y

Weitere Artikel der Ausgabe 5/2016

Peer-to-Peer Networking and Applications 5/2016 Zur Ausgabe