Skip to main content
Erschienen in: Cluster Computing 3/2021

29.01.2021

Efficient TPA-based auditing scheme for secure cloud storage

verfasst von: Bilin Shao, Yanyan Ji

Erschienen in: Cluster Computing | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, how to design efficient auditing protocol to verify the integrity of users’ data, which is stored in cloud services provider (CSP), becomes a research focus. Homomorphic message authentication code (MAC) and homomorphic signature are two popular techniques to respectively design private and public auditing protocols. On the one hand, it is not suitable for the homomorphic-MAC-based auditing protocols to be outsourced to third-party auditor (TPA), who has more professional knowledge and computational abilities, although they have high efficiencies. On the other hand, the homomorphic-signature-based ones are very suitable for employing TPA without compromising user’s signing key but have very low efficiency (compared to the former case). In this paper, we propose a new auditing protocol, which perfectly combines the advantages of above two cases. In particular, it is almost as efficient as a homomorphic-MAC-based protocol proposed by Zhang et al. recently. Moreover, it is also suitable for outsourcing to TPA because it does not compromise the privacy of users’ signing key, which can be seen from our security analysis. Finally, numerical analysis and experimental results demonstrate the high-efficiency of our protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Here, a function \(h(\lambda )\) of \(\lambda \) is called overwhelming if \(1-h(\lambda )\) is negligible.
 
Literatur
1.
Zurück zum Zitat Jyoti, A., Shrimali, M.: Dynamic provisioning of resources based on load balancing and service broker policy in cloud computing. Clust. Comput. 23(1), 377–395 (2020)CrossRef Jyoti, A., Shrimali, M.: Dynamic provisioning of resources based on load balancing and service broker policy in cloud computing. Clust. Comput. 23(1), 377–395 (2020)CrossRef
2.
Zurück zum Zitat Kalai Arasan, K., Anandhakumar, P.: A new GLoSM embedded virtual machine model for big data services in cloud storage systems. Clust. Comput. 22(1), 399–405 (2019)CrossRef Kalai Arasan, K., Anandhakumar, P.: A new GLoSM embedded virtual machine model for big data services in cloud storage systems. Clust. Comput. 22(1), 399–405 (2019)CrossRef
3.
Zurück zum Zitat Kumar Bedi, R., Singh, J., Kumar Gupta, S.: Design and implementation of an efficient multi cloud storage approach for resource constrained modile devices. Clust. Comput. 22, 13143–13157 (2019)CrossRef Kumar Bedi, R., Singh, J., Kumar Gupta, S.: Design and implementation of an efficient multi cloud storage approach for resource constrained modile devices. Clust. Comput. 22, 13143–13157 (2019)CrossRef
4.
Zurück zum Zitat Tchernykh, A., Miranda-L\(\acute{o}\)pez, V., Babenko, Mikhail G. et al.: Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. Clust. Comput. 22(4), 1173–1185 (2019) Tchernykh, A., Miranda-L\(\acute{o}\)pez, V., Babenko, Mikhail G. et al.: Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. Clust. Comput. 22(4), 1173–1185 (2019)
5.
Zurück zum Zitat Ni, J., Yu, Y., Mu, Y., et al.: On the security of an effieicent dynamic auditing protocol in cloud storage. IEEE Trans. Parall. Distr. 25(10), 2760–2761 (2014)CrossRef Ni, J., Yu, Y., Mu, Y., et al.: On the security of an effieicent dynamic auditing protocol in cloud storage. IEEE Trans. Parall. Distr. 25(10), 2760–2761 (2014)CrossRef
6.
Zurück zum Zitat Xue, J., Xu, C., Zhao, J. et al.: Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. In: Science China Information Sciences, vol. 62(3) (2019) Xue, J., Xu, C., Zhao, J. et al.: Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. In: Science China Information Sciences, vol. 62(3) (2019)
7.
Zurück zum Zitat Deswarte, Y., Quisquater, J. Sa\(\ddot{\text{1}}\)dane, A.: Remote integrity checking. In: Proceedings of IICIS 2003, vol. 140, pp. 1–11 (2003) Deswarte, Y., Quisquater, J. Sa\(\ddot{\text{1}}\)dane, A.: Remote integrity checking. In: Proceedings of IICIS 2003, vol. 140, pp. 1–11 (2003)
8.
Zurück zum Zitat Gazzoni Filho, D., Barreto, P.: Demonstrating Data Possession and Uncheatable Data Transfer. In: Cryptology ePring Archive, Report 2006/150 (2006) Gazzoni Filho, D., Barreto, P.: Demonstrating Data Possession and Uncheatable Data Transfer. In: Cryptology ePring Archive, Report 2006/150 (2006)
9.
Zurück zum Zitat Schwarz, T., Miller, E.: Store, forget, and check: using algebraic signatures to chek remotely administered storage. In: Proceedings of ICDCS 2006. Schwarz, T., Miller, E.: Store, forget, and check: using algebraic signatures to chek remotely administered storage. In: Proceedings of ICDCS 2006.
10.
Zurück zum Zitat Naor, M., Rothblum, G.: The complexity of online memory checking. Proc. FOCS 2005, 573–584 (2005) Naor, M., Rothblum, G.: The complexity of online memory checking. Proc. FOCS 2005, 573–584 (2005)
11.
Zurück zum Zitat Atenises, G., Burns, R., Curtmola, R. et al.: Provable Data Possession at untrusted Stores. In: Proceedings of CCS, pp. 598–609 (2007) Atenises, G., Burns, R., Curtmola, R. et al.: Provable Data Possession at untrusted Stores. In: Proceedings of CCS, pp. 598–609 (2007)
12.
Zurück zum Zitat Juels, A., Kaliski, B., Pors.: Proofs of retrievability for large files. In: Proceedings of CCS, pp. 584–597 (2007) Juels, A., Kaliski, B., Pors.: Proofs of retrievability for large files. In: Proceedings of CCS, pp. 584–597 (2007)
13.
Zurück zum Zitat Chang, J., Ji, Y., Xu, M., et al.: General transformations from single-genearation to multi-generation for homomorphic message authentication schemes in network coding. Future Gener. Comput. Syst. 91, 416–425 (2019)CrossRef Chang, J., Ji, Y., Xu, M., et al.: General transformations from single-genearation to multi-generation for homomorphic message authentication schemes in network coding. Future Gener. Comput. Syst. 91, 416–425 (2019)CrossRef
15.
Zurück zum Zitat Zhang, R., Ma, H., Lu, Y., et al.: Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci. China Inf. Sci. 60(12), 122104 (2017)CrossRef Zhang, R., Ma, H., Lu, Y., et al.: Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci. China Inf. Sci. 60(12), 122104 (2017)CrossRef
16.
Zurück zum Zitat Dan Boneh, D. Freeman, J. Katz, et al.: Signing a Linear Subspace: Signature: Signature Schemes for Network Coding. In: PKC, vol. 5443, pp. 68-87. Springer, Berlin, Germany (2009) Dan Boneh, D. Freeman, J. Katz, et al.: Signing a Linear Subspace: Signature: Signature Schemes for Network Coding. In: PKC, vol. 5443, pp. 68-87. Springer, Berlin, Germany (2009)
17.
Zurück zum Zitat Chang, J., Ma, H., Zhang, A., Xu, M., Xue, R.: RKA security of identity-based homomorphic signature scheme. IEEE Access 7, 50858–50868 (2019)CrossRef Chang, J., Ma, H., Zhang, A., Xu, M., Xue, R.: RKA security of identity-based homomorphic signature scheme. IEEE Access 7, 50858–50868 (2019)CrossRef
18.
Zurück zum Zitat Chang, J., Wang, H., Wang, F., et al.: RKA security for identity-based signature scheme. IEEE Access 8, 17833–17841 (2020)CrossRef Chang, J., Wang, H., Wang, F., et al.: RKA security for identity-based signature scheme. IEEE Access 8, 17833–17841 (2020)CrossRef
19.
Zurück zum Zitat Lin, Q., Yan, H., Huang, Z., et al.: An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE ACCESS 6, 20632–20639 (2018)CrossRef Lin, Q., Yan, H., Huang, Z., et al.: An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE ACCESS 6, 20632–20639 (2018)CrossRef
20.
Zurück zum Zitat Ji, Y., Shao, B., Chang, J. et al.: Privacy-Preserving Certificateless Provable Data Possession Scheme for Big Data Storage on Cloud, Revisited. In: Applied Mathematics and Computation, vol. 386, 125478 (2020) Ji, Y., Shao, B., Chang, J. et al.: Privacy-Preserving Certificateless Provable Data Possession Scheme for Big Data Storage on Cloud, Revisited. In: Applied Mathematics and Computation, vol. 386, 125478 (2020)
21.
Zurück zum Zitat Zhang, J., Yang, Y., Chen, Y., et al.: A general framework to design secure cloud storage protocol using homomorphic encryption scheme. Comput. Netw. 129, 37–50 (2017)CrossRef Zhang, J., Yang, Y., Chen, Y., et al.: A general framework to design secure cloud storage protocol using homomorphic encryption scheme. Comput. Netw. 129, 37–50 (2017)CrossRef
22.
Zurück zum Zitat Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC’2009, pp. 169–178 Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC’2009, pp. 169–178
23.
Zurück zum Zitat Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R. : “Dynamic Provable Data Possession,” in CCS’2009, pp. 213–222 (2009) Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R. : “Dynamic Provable Data Possession,” in CCS’2009, pp. 213–222 (2009)
24.
Zurück zum Zitat Wang, Q., Wang, C., Ren, K., et al.: Enabling public audititability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K., et al.: Enabling public audititability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
25.
Zurück zum Zitat Zhu, Y., Ahn, G., Hu, H., et al.: Dynamic audit services for outsourced storage in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)CrossRef Zhu, Y., Ahn, G., Hu, H., et al.: Dynamic audit services for outsourced storage in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)CrossRef
26.
Zurück zum Zitat Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2017)CrossRef Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2017)CrossRef
27.
Zurück zum Zitat Shen, J., Shen, J., Chen, X. et al.: An efficient public auditing protocol with novel dynamic sturcture for cloud data. In: IEEE Transactions on Information Forensics and Security, vol. 12(10), (2017) Shen, J., Shen, J., Chen, X. et al.: An efficient public auditing protocol with novel dynamic sturcture for cloud data. In: IEEE Transactions on Information Forensics and Security, vol. 12(10), (2017)
28.
Zurück zum Zitat Chen, F., Xiang, T., Yang, Y., et al.: Secure Cloud Storage Meets with Secure Network Coding. IEEE Trans. Comput. 65(6), 1936–1948 (2016)MathSciNetCrossRef Chen, F., Xiang, T., Yang, Y., et al.: Secure Cloud Storage Meets with Secure Network Coding. IEEE Trans. Comput. 65(6), 1936–1948 (2016)MathSciNetCrossRef
30.
Zurück zum Zitat Wu, X., Xu, Y., Yuen, C., Xiang, L.: A tag encoding scheme against pollution attack to linear network coding. IEEE Trans. Parallel Distrib. Syst. 25(1), 33–42 (2014)CrossRef Wu, X., Xu, Y., Yuen, C., Xiang, L.: A tag encoding scheme against pollution attack to linear network coding. IEEE Trans. Parallel Distrib. Syst. 25(1), 33–42 (2014)CrossRef
Metadaten
Titel
Efficient TPA-based auditing scheme for secure cloud storage
verfasst von
Bilin Shao
Yanyan Ji
Publikationsdatum
29.01.2021
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 3/2021
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-021-03239-x

Weitere Artikel der Ausgabe 3/2021

Cluster Computing 3/2021 Zur Ausgabe

Premium Partner