Skip to main content
Top
Published in: Soft Computing 16/2020

09-01-2020 | Methodologies and Application

Secure auditing and deduplication for encrypted cloud data supporting ownership modification

Authors: Jianli Bai, Jia Yu, Xiang Gao

Published in: Soft Computing | Issue 16/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space by exploiting the duplication techniques. However, when a data owner deletes or modifies his outsourced data, he should lose the ownership for the original data and should not be able to successfully retrieve this data any more. For all we know, existing cloud storage auditing and deduplication literatures fail to support the modifications of ownership, which actually occur quite often in actual cloud storage scenarios. In this paper, we propose the first deduplicated data integrity auditing scheme supporting the ownership modification. It guarantees the integrity of the outsourced data and supports the dynamic access control over the outsourced data. We employ a re-encryption algorithm and the secure identity-based broadcast encryption technology, which prevent data from being disclosed to the revoked owners, even if they previously had prior ownership of these data. The security and efficiency of our proposed scheme have been validated by detailed analysis and experiments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: ACM conference on computer and communications security, pp 598–609 Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: ACM conference on computer and communications security, pp 598–609
go back to reference Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on security and privacy in communication networks, pp 1–10 Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on security and privacy in communication networks, pp 1–10
go back to reference Baracaldo N, Androulaki E, Glider J, Sorniotti A (2014) Reconciling end-to-end confidentiality and data reduction in cloud storage. In: CCSW ’14 proceedings of the 6th edition of the ACM workshop on cloud computing security, pp 21–32 Baracaldo N, Androulaki E, Glider J, Sorniotti A (2014) Reconciling end-to-end confidentiality and data reduction in cloud storage. In: CCSW ’14 proceedings of the 6th edition of the ACM workshop on cloud computing security, pp 21–32
go back to reference Bellare M, Keelveedhi S, Ristenpart T (2013a) DupLESS: server-aided encryption for deduplicated storage. In: Usenix conference on security, pp 179–194 Bellare M, Keelveedhi S, Ristenpart T (2013a) DupLESS: server-aided encryption for deduplicated storage. In: Usenix conference on security, pp 179–194
go back to reference Bellare M, Keelveedhi S, Ristenpart T (2013b) Message-locked encryption and secure deduplication. In: International conference on the theory and applications of cryptographic techniques, pp 296–312 Bellare M, Keelveedhi S, Ristenpart T (2013b) Message-locked encryption and secure deduplication. In: International conference on the theory and applications of cryptographic techniques, pp 296–312
go back to reference Chu CK, Zhu WT, Han J, Liu JK, Xu J, Zhou J (2013) Security concerns in popular cloud storage services. IEEE Pervasive Comput 12:50–57CrossRef Chu CK, Zhu WT, Han J, Liu JK, Xu J, Zhou J (2013) Security concerns in popular cloud storage services. IEEE Pervasive Comput 12:50–57CrossRef
go back to reference Douceur JR, Adya A, Bolosky WJ, Simon P (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: International conference on distributed computing systems, 2002. Proceedings, pp 617–624 Douceur JR, Adya A, Bolosky WJ, Simon P (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: International conference on distributed computing systems, 2002. Proceedings, pp 617–624
go back to reference Erway CC, Papamanthou C, Tamassia R (2015) Dynamic provable data possession. Acm Trans Inf Syst Secur 17:15CrossRef Erway CC, Papamanthou C, Tamassia R (2015) Dynamic provable data possession. Acm Trans Inf Syst Secur 17:15CrossRef
go back to reference Harnik D, Pinkas B, Shulmanpeleg A (2010) Side channels in cloud services: deduplication in cloud storage. IEEE Secur Priv 8:40–47CrossRef Harnik D, Pinkas B, Shulmanpeleg A (2010) Side channels in cloud services: deduplication in cloud storage. IEEE Secur Priv 8:40–47CrossRef
go back to reference Halevi S, Harnik B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. IEEE 8:491–500 Halevi S, Harnik B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. IEEE 8:491–500
go back to reference He K, Huang C, Yang K, Shi J (2015) Identity-preserving public auditing for shared cloud data. In: IEEE international symposium on quality of service, pp 159–164 He K, Huang C, Yang K, Shi J (2015) Identity-preserving public auditing for shared cloud data. In: IEEE international symposium on quality of service, pp 159–164
go back to reference Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng 28:3113–3125CrossRef Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng 28:3113–3125CrossRef
go back to reference Jin H, Jiang H, Zhou K (2016) Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans Cloud Comput 6:680–693CrossRef Jin H, Jiang H, Zhou K (2016) Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans Cloud Comput 6:680–693CrossRef
go back to reference Juels A, Kaliski BS (2007) Pors: proofs of retrievability for large files. In: ACM conference on computer and communications security, pp 584–597 Juels A, Kaliski BS (2007) Pors: proofs of retrievability for large files. In: ACM conference on computer and communications security, pp 584–597
go back to reference Li Y, Yu Y, Min G, Susilo W, Ni J, Choo KKR (2017) Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans Dependable Secur Comput 16:72–83CrossRef Li Y, Yu Y, Min G, Susilo W, Ni J, Choo KKR (2017) Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans Dependable Secur Comput 16:72–83CrossRef
go back to reference Liu X, Sun W, Lou W, Pei Q, Zhang Y (2017) One-tag checker: message-locked integrity auditing on encrypted cloud deduplication storage. In: IEEE international conference on computer communications Liu X, Sun W, Lou W, Pei Q, Zhang Y (2017) One-tag checker: message-locked integrity auditing on encrypted cloud deduplication storage. In: IEEE international conference on computer communications
go back to reference Ng WK, Wen Y, Zhu H (2012) Private data deduplication protocols in cloud storage. In: Acm symposium on applied computing, pp 441–446 Ng WK, Wen Y, Zhu H (2012) Private data deduplication protocols in cloud storage. In: Acm symposium on applied computing, pp 441–446
go back to reference Sakai R, Furukawa J (2008) Identity-based broadcast encryption. J Electron Inf Technol 33:1047–1050 Sakai R, Furukawa J (2008) Identity-based broadcast encryption. J Electron Inf Technol 33:1047–1050
go back to reference Shen J, Shen J, Chen X, Huang X, Susilo W (2016) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12:2402–2415CrossRef Shen J, Shen J, Chen X, Huang X, Susilo W (2016) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12:2402–2415CrossRef
go back to reference Stanek J, Sorniotti A, Androulaki E, Kencl L (2014) A secure data deduplication scheme for cloud storage. IBM Corporation, New York, pp 99–118 Stanek J, Sorniotti A, Androulaki E, Kencl L (2014) A secure data deduplication scheme for cloud storage. IBM Corporation, New York, pp 99–118
go back to reference Storer MW, Greenan K, Long DDE, Miller EL (2008). Secure data deduplication. In: ACM international workshop on storage security and survivability, pp 1–10 Storer MW, Greenan K, Long DDE, Miller EL (2008). Secure data deduplication. In: ACM international workshop on storage security and survivability, pp 1–10
go back to reference Wang B, Chow SSM, Li M, Li H (2013) Storing shared data on the cloud via security-mediator. In: IEEE international conference on distributed computing systems, pp 124–133 Wang B, Chow SSM, Li M, Li H (2013) Storing shared data on the cloud via security-mediator. In: IEEE international conference on distributed computing systems, pp 124–133
go back to reference Wang C, Chow SSM, Wang Q, Ren K, Lou W (2012) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62:362–375MathSciNetCrossRef Wang C, Chow SSM, Wang Q, Ren K, Lou W (2012) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62:362–375MathSciNetCrossRef
go back to reference Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22:847–859CrossRef Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22:847–859CrossRef
go back to reference Wang Y, Wu Q, Qin B, Shi W, Deng RH, Hu J (2016) Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Trans Inf Forensics Secur 12:940–952CrossRef Wang Y, Wu Q, Qin B, Shi W, Deng RH, Hu J (2016) Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Trans Inf Forensics Secur 12:940–952CrossRef
go back to reference Worku SG, Xu C, Zhao J, He X (2014) Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng 40:1703–1713CrossRef Worku SG, Xu C, Zhao J, He X (2014) Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng 40:1703–1713CrossRef
go back to reference Xu J, Chang EC, Zhou J (2013) Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: ACM Sigsac symposium on information, computer and communications security, pp 195–206 Xu J, Chang EC, Zhou J (2013) Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: ACM Sigsac symposium on information, computer and communications security, pp 195–206
go back to reference Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J Syst Softw 113:130–139CrossRef Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J Syst Softw 113:130–139CrossRef
go back to reference Yu J, Ren K, Wang C, Varadharajan V (2017) Enabling cloud storage auditing with key-exposure resistance. IEEE Trans Inf Forensics Secur 10:1167–1179 Yu J, Ren K, Wang C, Varadharajan V (2017) Enabling cloud storage auditing with key-exposure resistance. IEEE Trans Inf Forensics Secur 10:1167–1179
go back to reference Yu J, Wang H (2017) Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans Inf Forensics Secur 12:1931–1940CrossRef Yu J, Wang H (2017) Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans Inf Forensics Secur 12:1931–1940CrossRef
go back to reference Yuan J, Yu S (2013). Secure and constant cost public cloud storage auditing with deduplication. In: Communications and network security, pp 145–153 Yuan J, Yu S (2013). Secure and constant cost public cloud storage auditing with deduplication. In: Communications and network security, pp 145–153
go back to reference Zhao P, Yu J, Zhang H, Qin Z, Wang C (2019) How to securely outsource finding the min-cut of undirected edge-weighted graphs. IEEE Trans Inf Forensics Secur 15:315–328CrossRef Zhao P, Yu J, Zhang H, Qin Z, Wang C (2019) How to securely outsource finding the min-cut of undirected edge-weighted graphs. IEEE Trans Inf Forensics Secur 15:315–328CrossRef
go back to reference Zhu Y, Ahn GJ, Hu H, Yau SS, An HG, Chen S (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6:227–238CrossRef Zhu Y, Ahn GJ, Hu H, Yau SS, An HG, Chen S (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6:227–238CrossRef
Metadata
Title
Secure auditing and deduplication for encrypted cloud data supporting ownership modification
Authors
Jianli Bai
Jia Yu
Xiang Gao
Publication date
09-01-2020
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 16/2020
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04661-5

Other articles of this Issue 16/2020

Soft Computing 16/2020 Go to the issue

Premium Partner