Skip to main content
Top
Published in: Cluster Computing 3/2021

29-01-2021

Efficient TPA-based auditing scheme for secure cloud storage

Authors: Bilin Shao, Yanyan Ji

Published in: Cluster Computing | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent years, how to design efficient auditing protocol to verify the integrity of users’ data, which is stored in cloud services provider (CSP), becomes a research focus. Homomorphic message authentication code (MAC) and homomorphic signature are two popular techniques to respectively design private and public auditing protocols. On the one hand, it is not suitable for the homomorphic-MAC-based auditing protocols to be outsourced to third-party auditor (TPA), who has more professional knowledge and computational abilities, although they have high efficiencies. On the other hand, the homomorphic-signature-based ones are very suitable for employing TPA without compromising user’s signing key but have very low efficiency (compared to the former case). In this paper, we propose a new auditing protocol, which perfectly combines the advantages of above two cases. In particular, it is almost as efficient as a homomorphic-MAC-based protocol proposed by Zhang et al. recently. Moreover, it is also suitable for outsourcing to TPA because it does not compromise the privacy of users’ signing key, which can be seen from our security analysis. Finally, numerical analysis and experimental results demonstrate the high-efficiency of our protocol.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Here, a function \(h(\lambda )\) of \(\lambda \) is called overwhelming if \(1-h(\lambda )\) is negligible.
 
Literature
1.
go back to reference Jyoti, A., Shrimali, M.: Dynamic provisioning of resources based on load balancing and service broker policy in cloud computing. Clust. Comput. 23(1), 377–395 (2020)CrossRef Jyoti, A., Shrimali, M.: Dynamic provisioning of resources based on load balancing and service broker policy in cloud computing. Clust. Comput. 23(1), 377–395 (2020)CrossRef
2.
go back to reference Kalai Arasan, K., Anandhakumar, P.: A new GLoSM embedded virtual machine model for big data services in cloud storage systems. Clust. Comput. 22(1), 399–405 (2019)CrossRef Kalai Arasan, K., Anandhakumar, P.: A new GLoSM embedded virtual machine model for big data services in cloud storage systems. Clust. Comput. 22(1), 399–405 (2019)CrossRef
3.
go back to reference Kumar Bedi, R., Singh, J., Kumar Gupta, S.: Design and implementation of an efficient multi cloud storage approach for resource constrained modile devices. Clust. Comput. 22, 13143–13157 (2019)CrossRef Kumar Bedi, R., Singh, J., Kumar Gupta, S.: Design and implementation of an efficient multi cloud storage approach for resource constrained modile devices. Clust. Comput. 22, 13143–13157 (2019)CrossRef
4.
go back to reference Tchernykh, A., Miranda-L\(\acute{o}\)pez, V., Babenko, Mikhail G. et al.: Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. Clust. Comput. 22(4), 1173–1185 (2019) Tchernykh, A., Miranda-L\(\acute{o}\)pez, V., Babenko, Mikhail G. et al.: Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. Clust. Comput. 22(4), 1173–1185 (2019)
5.
go back to reference Ni, J., Yu, Y., Mu, Y., et al.: On the security of an effieicent dynamic auditing protocol in cloud storage. IEEE Trans. Parall. Distr. 25(10), 2760–2761 (2014)CrossRef Ni, J., Yu, Y., Mu, Y., et al.: On the security of an effieicent dynamic auditing protocol in cloud storage. IEEE Trans. Parall. Distr. 25(10), 2760–2761 (2014)CrossRef
6.
go back to reference Xue, J., Xu, C., Zhao, J. et al.: Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. In: Science China Information Sciences, vol. 62(3) (2019) Xue, J., Xu, C., Zhao, J. et al.: Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. In: Science China Information Sciences, vol. 62(3) (2019)
7.
go back to reference Deswarte, Y., Quisquater, J. Sa\(\ddot{\text{1}}\)dane, A.: Remote integrity checking. In: Proceedings of IICIS 2003, vol. 140, pp. 1–11 (2003) Deswarte, Y., Quisquater, J. Sa\(\ddot{\text{1}}\)dane, A.: Remote integrity checking. In: Proceedings of IICIS 2003, vol. 140, pp. 1–11 (2003)
8.
go back to reference Gazzoni Filho, D., Barreto, P.: Demonstrating Data Possession and Uncheatable Data Transfer. In: Cryptology ePring Archive, Report 2006/150 (2006) Gazzoni Filho, D., Barreto, P.: Demonstrating Data Possession and Uncheatable Data Transfer. In: Cryptology ePring Archive, Report 2006/150 (2006)
9.
go back to reference Schwarz, T., Miller, E.: Store, forget, and check: using algebraic signatures to chek remotely administered storage. In: Proceedings of ICDCS 2006. Schwarz, T., Miller, E.: Store, forget, and check: using algebraic signatures to chek remotely administered storage. In: Proceedings of ICDCS 2006.
10.
go back to reference Naor, M., Rothblum, G.: The complexity of online memory checking. Proc. FOCS 2005, 573–584 (2005) Naor, M., Rothblum, G.: The complexity of online memory checking. Proc. FOCS 2005, 573–584 (2005)
11.
go back to reference Atenises, G., Burns, R., Curtmola, R. et al.: Provable Data Possession at untrusted Stores. In: Proceedings of CCS, pp. 598–609 (2007) Atenises, G., Burns, R., Curtmola, R. et al.: Provable Data Possession at untrusted Stores. In: Proceedings of CCS, pp. 598–609 (2007)
12.
go back to reference Juels, A., Kaliski, B., Pors.: Proofs of retrievability for large files. In: Proceedings of CCS, pp. 584–597 (2007) Juels, A., Kaliski, B., Pors.: Proofs of retrievability for large files. In: Proceedings of CCS, pp. 584–597 (2007)
13.
go back to reference Chang, J., Ji, Y., Xu, M., et al.: General transformations from single-genearation to multi-generation for homomorphic message authentication schemes in network coding. Future Gener. Comput. Syst. 91, 416–425 (2019)CrossRef Chang, J., Ji, Y., Xu, M., et al.: General transformations from single-genearation to multi-generation for homomorphic message authentication schemes in network coding. Future Gener. Comput. Syst. 91, 416–425 (2019)CrossRef
15.
go back to reference Zhang, R., Ma, H., Lu, Y., et al.: Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci. China Inf. Sci. 60(12), 122104 (2017)CrossRef Zhang, R., Ma, H., Lu, Y., et al.: Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci. China Inf. Sci. 60(12), 122104 (2017)CrossRef
16.
go back to reference Dan Boneh, D. Freeman, J. Katz, et al.: Signing a Linear Subspace: Signature: Signature Schemes for Network Coding. In: PKC, vol. 5443, pp. 68-87. Springer, Berlin, Germany (2009) Dan Boneh, D. Freeman, J. Katz, et al.: Signing a Linear Subspace: Signature: Signature Schemes for Network Coding. In: PKC, vol. 5443, pp. 68-87. Springer, Berlin, Germany (2009)
17.
go back to reference Chang, J., Ma, H., Zhang, A., Xu, M., Xue, R.: RKA security of identity-based homomorphic signature scheme. IEEE Access 7, 50858–50868 (2019)CrossRef Chang, J., Ma, H., Zhang, A., Xu, M., Xue, R.: RKA security of identity-based homomorphic signature scheme. IEEE Access 7, 50858–50868 (2019)CrossRef
18.
go back to reference Chang, J., Wang, H., Wang, F., et al.: RKA security for identity-based signature scheme. IEEE Access 8, 17833–17841 (2020)CrossRef Chang, J., Wang, H., Wang, F., et al.: RKA security for identity-based signature scheme. IEEE Access 8, 17833–17841 (2020)CrossRef
19.
go back to reference Lin, Q., Yan, H., Huang, Z., et al.: An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE ACCESS 6, 20632–20639 (2018)CrossRef Lin, Q., Yan, H., Huang, Z., et al.: An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE ACCESS 6, 20632–20639 (2018)CrossRef
20.
go back to reference Ji, Y., Shao, B., Chang, J. et al.: Privacy-Preserving Certificateless Provable Data Possession Scheme for Big Data Storage on Cloud, Revisited. In: Applied Mathematics and Computation, vol. 386, 125478 (2020) Ji, Y., Shao, B., Chang, J. et al.: Privacy-Preserving Certificateless Provable Data Possession Scheme for Big Data Storage on Cloud, Revisited. In: Applied Mathematics and Computation, vol. 386, 125478 (2020)
21.
go back to reference Zhang, J., Yang, Y., Chen, Y., et al.: A general framework to design secure cloud storage protocol using homomorphic encryption scheme. Comput. Netw. 129, 37–50 (2017)CrossRef Zhang, J., Yang, Y., Chen, Y., et al.: A general framework to design secure cloud storage protocol using homomorphic encryption scheme. Comput. Netw. 129, 37–50 (2017)CrossRef
22.
go back to reference Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC’2009, pp. 169–178 Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC’2009, pp. 169–178
23.
go back to reference Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R. : “Dynamic Provable Data Possession,” in CCS’2009, pp. 213–222 (2009) Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R. : “Dynamic Provable Data Possession,” in CCS’2009, pp. 213–222 (2009)
24.
go back to reference Wang, Q., Wang, C., Ren, K., et al.: Enabling public audititability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K., et al.: Enabling public audititability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
25.
go back to reference Zhu, Y., Ahn, G., Hu, H., et al.: Dynamic audit services for outsourced storage in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)CrossRef Zhu, Y., Ahn, G., Hu, H., et al.: Dynamic audit services for outsourced storage in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)CrossRef
26.
go back to reference Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2017)CrossRef Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2017)CrossRef
27.
go back to reference Shen, J., Shen, J., Chen, X. et al.: An efficient public auditing protocol with novel dynamic sturcture for cloud data. In: IEEE Transactions on Information Forensics and Security, vol. 12(10), (2017) Shen, J., Shen, J., Chen, X. et al.: An efficient public auditing protocol with novel dynamic sturcture for cloud data. In: IEEE Transactions on Information Forensics and Security, vol. 12(10), (2017)
28.
go back to reference Chen, F., Xiang, T., Yang, Y., et al.: Secure Cloud Storage Meets with Secure Network Coding. IEEE Trans. Comput. 65(6), 1936–1948 (2016)MathSciNetCrossRef Chen, F., Xiang, T., Yang, Y., et al.: Secure Cloud Storage Meets with Secure Network Coding. IEEE Trans. Comput. 65(6), 1936–1948 (2016)MathSciNetCrossRef
30.
go back to reference Wu, X., Xu, Y., Yuen, C., Xiang, L.: A tag encoding scheme against pollution attack to linear network coding. IEEE Trans. Parallel Distrib. Syst. 25(1), 33–42 (2014)CrossRef Wu, X., Xu, Y., Yuen, C., Xiang, L.: A tag encoding scheme against pollution attack to linear network coding. IEEE Trans. Parallel Distrib. Syst. 25(1), 33–42 (2014)CrossRef
Metadata
Title
Efficient TPA-based auditing scheme for secure cloud storage
Authors
Bilin Shao
Yanyan Ji
Publication date
29-01-2021
Publisher
Springer US
Published in
Cluster Computing / Issue 3/2021
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-021-03239-x

Other articles of this Issue 3/2021

Cluster Computing 3/2021 Go to the issue

Premium Partner