Skip to main content
Erschienen in: Cluster Computing 1/2016

01.03.2016

IPad: ID-based public auditing for the outsourced data in the standard model

verfasst von: Jianhong Zhang, Pengyan Li, Jian Mao

Erschienen in: Cluster Computing | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud storage is an important cloud computing service, it allows data users to store and access their files anytime, from anywhere and with any device. To ensure the security of the outsourced data, it also must allow data user to periodically verify integrity of the data which was outsourced to an untrusted cloud server at a relatively low cost. To solve this problem, most recent auditing protocols are mainly based on the traditional-public key infrastructure. In this infrastructure, the auditor must validate the certificates of data user before auditing data integrity. Thus, it results in a large amount of computation cost and is not suitable to the multi-user setting. To overcome this problem, in this paper, we propose two efficient ID-based public auditing protocols for the outsourced data by combing Water’s signature and public auditing for the outsourced data. And the two protocols are provably secure in the standard security model. Especially, our optimized protocol has constant communication overhead and computation cost. To the best of our knowledge, it is the first ID-based auditing for data integrity in the standard security model. By comparison with Wang et al.’s scheme and Tan et al.’s scheme, our protocols have the large advantages over the other two schemes in terms of communication cost and computation cost. Simulation results show that our proposed ID-based auditing protocols are the most efficient among three schemes in terms of computation cost.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Deng, H., Wu, Q., Qin, B., Chow, S.S.M., Domingo-Ferrer, J., Shi, W.: Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. In: ASIA-CCS2014, pp. 425–434 (2014) Deng, H., Wu, Q., Qin, B., Chow, S.S.M., Domingo-Ferrer, J., Shi, W.: Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. In: ASIA-CCS2014, pp. 425–434 (2014)
2.
Zurück zum Zitat Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)CrossRef Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)CrossRef
3.
Zurück zum Zitat Ateniese, S.G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 07), pp. 598-609 (2007) Ateniese, S.G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 07), pp. 598-609 (2007)
4.
Zurück zum Zitat Juels, A., Kaliski, B.S. Jr.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS’07), pp. 584–597 (2007) Juels, A., Kaliski, B.S. Jr.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS’07), pp. 584–597 (2007)
5.
Zurück zum Zitat Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the 14th International Conference on Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT’08), pp. 90–107 (2008) Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the 14th International Conference on Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT’08), pp. 90–107 (2008)
6.
Zurück zum Zitat Sebe, F., Domingo-Ferrer, J., Mart nez-Balleste, A., Deswarte, Y., Quisquater, J.-J.: Efficient Remote data possession checking in critical information infrastructures. In: IEEE Transaction of Knowledge Data Engineering, vol. 20, no. 8, pp. 1034–1038 (2008) Sebe, F., Domingo-Ferrer, J., Mart nez-Balleste, A., Deswarte, Y., Quisquater, J.-J.: Efficient Remote data possession checking in critical information infrastructures. In: IEEE Transaction of Knowledge Data Engineering, vol. 20, no. 8, pp. 1034–1038 (2008)
7.
Zurück zum Zitat Yamamoto, G., Oda, S., Aoki, K.: Fast integrity for large data. In: Proceedings of the ECRYPT Workshop Software Performance Enhancement for Encryption and Decryption, pp. 21–32 (2007) Yamamoto, G., Oda, S., Aoki, K.: Fast integrity for large data. In: Proceedings of the ECRYPT Workshop Software Performance Enhancement for Encryption and Decryption, pp. 21–32 (2007)
8.
Zurück zum Zitat Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to keep online storage services honest. In: Hunt, G.C. (ed.) Proceedings of the 11th USENIX Workshop Hot Topics in Operating Systems (HOTOS) (2007) Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to keep online storage services honest. In: Hunt, G.C. (ed.) Proceedings of the 11th USENIX Workshop Hot Topics in Operating Systems (HOTOS) (2007)
9.
Zurück zum Zitat Chang, E.-C., Xu, J.: Remote integrity check with dishonest storage server. In: Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS’08), pp. 223–237 (2008) Chang, E.-C., Xu, J.: Remote integrity check with dishonest storage server. In: Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS’08), pp. 223–237 (2008)
10.
Zurück zum Zitat Boneh, D., Boyen, X., Shacham, H.: Short group signatures. Procedings of Advanced Cryptology Crypto, Series. LNCS, vol. 3152, pp. 41–45. Springer, New York (2004) Boneh, D., Boyen, X., Shacham, H.: Short group signatures. Procedings of Advanced Cryptology Crypto, Series. LNCS, vol. 3152, pp. 41–45. Springer, New York (2004)
11.
Zurück zum Zitat Selvi, S.S.D., Vivek, S.S., Rangan, C.P.: Identity-based de-terministic signature scheme without forking-lemma. In: IWSEC 2011, LNCS 7038, pp. 79–95 (2011) Selvi, S.S.D., Vivek, S.S., Rangan, C.P.: Identity-based de-terministic signature scheme without forking-lemma. In: IWSEC 2011, LNCS 7038, pp. 79–95 (2011)
12.
Zurück zum Zitat Wang, B., Li, B., Li, H., Li, F.: Certificateless public auditing for data integrity in the cloud. CNS 2013, 276–284 (2013) Wang, B., Li, B., Li, H., Li, F.: Certificateless public auditing for data integrity in the cloud. CNS 2013, 276–284 (2013)
13.
Zurück zum Zitat Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. In: The Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM 2013), pp. 2904–2912 Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. In: The Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM 2013), pp. 2904–2912
14.
Zurück zum Zitat Jia, X., Ee-Chien, C.: Towards efficient provable data possession. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS12, Seoul, Korea (2012) Jia, X., Ee-Chien, C.: Towards efficient provable data possession. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS12, Seoul, Korea (2012)
15.
Zurück zum Zitat Yuan, J., Yu, S.: Proofs of retrievability with public verifiability and constant communication cost in cloud. In: Cloud Computing 2013, pp. 19–29. ACM (2013) Yuan, J., Yu, S.: Proofs of retrievability with public verifiability and constant communication cost in cloud. In: Cloud Computing 2013, pp. 19–29. ACM (2013)
16.
Zurück zum Zitat Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)CrossRef Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)CrossRef
17.
Zurück zum Zitat Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
18.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of IEEE INFOCOM, pp. 525–533 (2010) Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of IEEE INFOCOM, pp. 525–533 (2010)
19.
Zurück zum Zitat Zhu, Y., Hu, H., Ahn, G., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)CrossRef Zhu, Y., Hu, H., Ahn, G., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)CrossRef
20.
Zurück zum Zitat Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proceedings of ACM Symposium on Applied Computing, pp. 1550–1557 (2011) Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proceedings of ACM Symposium on Applied Computing, pp. 1550–1557 (2011)
21.
Zurück zum Zitat Zeng, K.: Publicly verifiable remote data integrity. In: Proceedings of the 10th International Conference on Information and Communication Security, pp. 419–434 (2008) Zeng, K.: Publicly verifiable remote data integrity. In: Proceedings of the 10th International Conference on Information and Communication Security, pp. 419–434 (2008)
22.
Zurück zum Zitat Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Proceedings of International Conference on Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 319–333 (2009) Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Proceedings of International Conference on Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 319–333 (2009)
23.
Zurück zum Zitat Zhu, Y., Hu, H.X., Ahn, G.J., et al.: Collaborative integrity verification in hybrid clouds. In: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 191–200 Zhu, Y., Hu, H.X., Ahn, G.J., et al.: Collaborative integrity verification in hybrid clouds. In: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 191–200
24.
Zurück zum Zitat Wei, L., et al.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)CrossRef Wei, L., et al.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)CrossRef
25.
Zurück zum Zitat Wei, L., et al.: SecCloud: bridging secure storage and computation in cloud. ICDCS Workshops 2010, 52–61 (2010) Wei, L., et al.: SecCloud: bridging secure storage and computation in cloud. ICDCS Workshops 2010, 52–61 (2010)
26.
Zurück zum Zitat Zhang, X., et al.: DFL: secure and practical fault localization for datacenter networks. IEEE/ACM Trans. Netw. 22(4), 1218–1231 (2014)CrossRef Zhang, X., et al.: DFL: secure and practical fault localization for datacenter networks. IEEE/ACM Trans. Netw. 22(4), 1218–1231 (2014)CrossRef
27.
Zurück zum Zitat Jing, Q., Vasilakos, A.V., Wan, J., Jingwei, L., Qiu, D.: Security of the Internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRef Jing, Q., Vasilakos, A.V., Wan, J., Jingwei, L., Qiu, D.: Security of the Internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRef
28.
30.
Zurück zum Zitat Attar, A., et al.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE 100(12), 3172–3186 (2012)CrossRef Attar, A., et al.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE 100(12), 3172–3186 (2012)CrossRef
32.
Zurück zum Zitat Shuang, T.A.N., Yan, J.I.A.: NaEPASC: a novel and efficient public auditing scheme for cloud data. J. Zhejiang Univ. Sci. C 15(9), 794–804 (2014)CrossRef Shuang, T.A.N., Yan, J.I.A.: NaEPASC: a novel and efficient public auditing scheme for cloud data. J. Zhejiang Univ. Sci. C 15(9), 794–804 (2014)CrossRef
33.
Zurück zum Zitat Goh, E.-J., Jarecki, S.: A signature scheme as secure as the Diffie-Hellman problem. In: EUROCRYPT 2003. LNCS, vol. 2656, pp. 401–415 (2003) Goh, E.-J., Jarecki, S.: A signature scheme as secure as the Diffie-Hellman problem. In: EUROCRYPT 2003. LNCS, vol. 2656, pp. 401–415 (2003)
Metadaten
Titel
IPad: ID-based public auditing for the outsourced data in the standard model
verfasst von
Jianhong Zhang
Pengyan Li
Jian Mao
Publikationsdatum
01.03.2016
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 1/2016
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-015-0511-3

Weitere Artikel der Ausgabe 1/2016

Cluster Computing 1/2016 Zur Ausgabe