Skip to main content
Erschienen in: Wireless Personal Communications 3/2019

19.02.2019

Privacy-Preserving Certificateless Cloud Auditing with Multiple Users

verfasst von: Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang

Erschienen in: Wireless Personal Communications | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud auditing is one of the important processes to ensure the security and integrity of data in cloud storage. Implementing cloud auditing requires various cryptographic tools such as identity-based cryptography and its variant: certificateless cryptography which solves the inherent key escrow problem in identity-based cryptography. Applying certificateless cryptography to cloud auditing has shown many merits. However, in a multi-user setting, certificateless cloud auditing (CLCA) schemes require additional security requirements. For instance, the identity privacy becomes an important issue that should be taken into consideration in some applications. In this paper, we concentrate on the identity privacy of CLCA schemes. We define the security models of privacy-preserving CLCA schemes, namely the uncheatability and anonymity and propose an efficient CLCA scheme, which is secure in the security models. As a feature of our scheme, the tag of a message is compact, which consists of only one group element. The uncheatability is based on variants of bilinear Diffie–Hellman assumption in the random oracle model. The identity privacy of the user is information-theoretically guaranteed against the third party auditor.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
In practice, the challenge is normally composed of a set of indexes (which is a subset of \([1, \dots , i_\mathsf{max}]\)) selected by \({\mathcal {A}}\). For simplicity, we assume that \({\mathcal {A}}\) chooses only one index and one message.
 
Literatur
1.
Zurück zum Zitat Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Springer. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Springer.
2.
Zurück zum Zitat Ateniese, G., Burns, R. C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. N. J., & Song, D. X. (2007). Provable data possession at untrusted stores. In ACM conference on computer and communications security-CCS 2007 (pp. 598–609). ACM. Ateniese, G., Burns, R. C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. N. J., & Song, D. X. (2007). Provable data possession at untrusted stores. In ACM conference on computer and communications security-CCS 2007 (pp. 598–609). ACM.
3.
Zurück zum Zitat Ateniese, G., Kamara, S., & Katz, J. (2009). Proofs of storage from homomorphic identification protocols. In Advances in cryptology-ASIACRYPT 2009 (pp. 319–333). Springer. Ateniese, G., Kamara, S., & Katz, J. (2009). Proofs of storage from homomorphic identification protocols. In Advances in cryptology-ASIACRYPT 2009 (pp. 319–333). Springer.
4.
Zurück zum Zitat Bao, F., Deng, R. H., & Zhu, H. (2003). Variations of Diffie–Hellman problem. In International conference on information and communications security-ICICS 2003 (pp. 301–312). Springer. Bao, F., Deng, R. H., & Zhu, H. (2003). Variations of Diffie–Hellman problem. In International conference on information and communications security-ICICS 2003 (pp. 301–312). Springer.
5.
Zurück zum Zitat Feng, Y., Mu, Y., Yang, G., & Liu, J. K. (2015). A new public remote integrity checking scheme with user privacy. In: Australasian conference on information security and privacy-ACISP 2015 (pp. 377–394). Springer. Feng, Y., Mu, Y., Yang, G., & Liu, J. K. (2015). A new public remote integrity checking scheme with user privacy. In: Australasian conference on information security and privacy-ACISP 2015 (pp. 377–394). Springer.
6.
Zurück zum Zitat Gu, K., Wang, L., Wu, N., & Liao, N. (2018). Traceable certificateless ring signature scheme for no full anonymous applications. International Journal of Network Security, 20(4), 762–773. Gu, K., Wang, L., Wu, N., & Liao, N. (2018). Traceable certificateless ring signature scheme for no full anonymous applications. International Journal of Network Security, 20(4), 762–773.
7.
Zurück zum Zitat He, D., Kumar, N., Wang, H., Wang, L., & Choo, K. R. (2017). Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Applied Mathematics and Computation, 314, 31–43.MathSciNetCrossRef He, D., Kumar, N., Wang, H., Wang, L., & Choo, K. R. (2017). Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Applied Mathematics and Computation, 314, 31–43.MathSciNetCrossRef
8.
Zurück zum Zitat He, D., Kumar, N., Zeadally, S., & Wang, H. (2018). Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Transactions on Industrial Informatics, 14(3), 1232–1241.CrossRef He, D., Kumar, N., Zeadally, S., & Wang, H. (2018). Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Transactions on Industrial Informatics, 14(3), 1232–1241.CrossRef
9.
Zurück zum Zitat He, D., Zeadally, S., & Wu, L. (2018). Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 12(1), 64–73.CrossRef He, D., Zeadally, S., & Wu, L. (2018). Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 12(1), 64–73.CrossRef
10.
Zurück zum Zitat Huang, L., Zhang, G., & Fu, A. (2017). Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group. In Australasian computer science week-ACSW 2017 (pp. 76:1–76:6). ACM. Huang, L., Zhang, G., & Fu, A. (2017). Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group. In Australasian computer science week-ACSW 2017 (pp. 76:1–76:6). ACM.
11.
Zurück zum Zitat Huang, L., Zhang, G., & Fu, A. (2018). Privacy-preserving public auditing for non-manager group shared data. Wireless Personal Communications, 100(4), 1277–1294.CrossRef Huang, L., Zhang, G., & Fu, A. (2018). Privacy-preserving public auditing for non-manager group shared data. Wireless Personal Communications, 100(4), 1277–1294.CrossRef
12.
Zurück zum Zitat Huang, L., Zhou, J., Zhang, G., Sun, J., Wang, T., & Vajdi, A. (2018). Certificateless public verification for the outsourced data integrity in cloud storage. Journal of Circuits, Systems, and Computers, 27(11), 1–17.CrossRef Huang, L., Zhou, J., Zhang, G., Sun, J., Wang, T., & Vajdi, A. (2018). Certificateless public verification for the outsourced data integrity in cloud storage. Journal of Circuits, Systems, and Computers, 27(11), 1–17.CrossRef
13.
Zurück zum Zitat Huang, X., Mu, Y., Susilo, W., Wong, D. S., & Wu, W. (2007). Certificateless signature revisited. In Australasian conference on information security and privacy-ACISP 2007 (pp. 308–322). Springer. Huang, X., Mu, Y., Susilo, W., Wong, D. S., & Wu, W. (2007). Certificateless signature revisited. In Australasian conference on information security and privacy-ACISP 2007 (pp. 308–322). Springer.
14.
Zurück zum Zitat Juels, A., & Kaliski, B. S., Jr. (2007). PORs: Proofs of retrievability for large files. In ACM conference on computer and communications security-CCS 2007 (pp. 584–597). ACM. Juels, A., & Kaliski, B. S., Jr. (2007). PORs: Proofs of retrievability for large files. In ACM conference on computer and communications security-CCS 2007 (pp. 584–597). ACM.
15.
Zurück zum Zitat Kang, B., Wang, J., & Shao, D. (2017). Certificateless public auditing with privacy preserving for cloud-assisted wireless body area networks. Mobile Information Systems, 2017, 2925465:1–2925465:5.CrossRef Kang, B., Wang, J., & Shao, D. (2017). Certificateless public auditing with privacy preserving for cloud-assisted wireless body area networks. Mobile Information Systems, 2017, 2925465:1–2925465:5.CrossRef
16.
Zurück zum Zitat Kim, D., & Jeong, I. R. (2017). Certificateless public auditing protocol with constant verification time. Security and Communication Networks, 2017, 6758618:1–6758618:14. Kim, D., & Jeong, I. R. (2017). Certificateless public auditing protocol with constant verification time. Security and Communication Networks, 2017, 6758618:1–6758618:14.
17.
Zurück zum Zitat Loheswaran, K., & Premalatha, J. (2016). Renaissance system model improving security and third party auditing in cloud computing. Wireless Personal Communications, 90(2), 1051–1066.CrossRef Loheswaran, K., & Premalatha, J. (2016). Renaissance system model improving security and third party auditing in cloud computing. Wireless Personal Communications, 90(2), 1051–1066.CrossRef
18.
Zurück zum Zitat Rawal, B. S., Vijayakumar, V., Manogaran, G., Varatharajan, R., & Chilamkurti, N. (2018). Secure disintegration protocol for privacy preserving cloud storage. Wireless Personal Communications, 103(2), 1161–1177.CrossRef Rawal, B. S., Vijayakumar, V., Manogaran, G., Varatharajan, R., & Chilamkurti, N. (2018). Secure disintegration protocol for privacy preserving cloud storage. Wireless Personal Communications, 103(2), 1161–1177.CrossRef
19.
Zurück zum Zitat Tian, H., Nan, F., Chang, C., Huang, Y., Lu, J., & Du, Y. (2019). Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. Journal of Network and Computer Applications, 127, 59–69.CrossRef Tian, H., Nan, F., Chang, C., Huang, Y., Lu, J., & Du, Y. (2019). Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. Journal of Network and Computer Applications, 127, 59–69.CrossRef
20.
Zurück zum Zitat Wang, B., Li, B., & Li, H. (2012). Knox: Privacy-preserving auditing for shared data with large groups in the cloud. In International conference on applied cryptography and network security-ACNS 2012 (pp. 507–525). Springer. Wang, B., Li, B., & Li, H. (2012). Knox: Privacy-preserving auditing for shared data with large groups in the cloud. In International conference on applied cryptography and network security-ACNS 2012 (pp. 507–525). Springer.
21.
Zurück zum Zitat Wang, B., Li, B., & Li, H. (2014). Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE Transactions on Cloud Computing, 2(1), 43–56.MathSciNetCrossRef Wang, B., Li, B., & Li, H. (2014). Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE Transactions on Cloud Computing, 2(1), 43–56.MathSciNetCrossRef
22.
Zurück zum Zitat Wang, B., Li, B., Li, H., & Li, F. (2013). Certificateless public auditing for data integrity in the cloud. In IEEE conference on communications and network security-CNS 2013 (pp. 136–144). IEEE. Wang, B., Li, B., Li, H., & Li, F. (2013). Certificateless public auditing for data integrity in the cloud. In IEEE conference on communications and network security-CNS 2013 (pp. 136–144). IEEE.
23.
Zurück zum Zitat Wang, B., Li, H., & Li, M. (2013). Privacy-preserving public auditing for shared cloud data supporting group dynamics. In IEEE international conference on communications-ICC 2013 (pp. 1946–1950). IEEE. Wang, B., Li, H., & Li, M. (2013). Privacy-preserving public auditing for shared cloud data supporting group dynamics. In IEEE international conference on communications-ICC 2013 (pp. 1946–1950). IEEE.
24.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. In IEEE international conference on computer communications-INFOCOM 2010 (pp. 525–533). IEEE. Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. In IEEE international conference on computer communications-INFOCOM 2010 (pp. 525–533). IEEE.
25.
Zurück zum Zitat Waters, B. (2005). Efficient identity-based encryption without random oracles. In Advances in cryptology - EUROCRYPT, 2005 (pp. 114–127). Waters, B. (2005). Efficient identity-based encryption without random oracles. In Advances in cryptology - EUROCRYPT, 2005 (pp. 114–127).
26.
Zurück zum Zitat Wu, G., Mu, Y., Susilo, W., & Guo, F. (2016). Privacy-preserving cloud auditing with multiple uploaders. In International conference on information security practice and experience-ISPEC 2016 (pp. 224–237). Springer. Wu, G., Mu, Y., Susilo, W., & Guo, F. (2016). Privacy-preserving cloud auditing with multiple uploaders. In International conference on information security practice and experience-ISPEC 2016 (pp. 224–237). Springer.
27.
Zurück zum Zitat Wu, L., Wang, J., Zeadally, S., & He, D. (2018). Privacy-preserving auditing scheme for shared data in public clouds. The Journal of Supercomputing, 74(11), 6156–6183.CrossRef Wu, L., Wang, J., Zeadally, S., & He, D. (2018). Privacy-preserving auditing scheme for shared data in public clouds. The Journal of Supercomputing, 74(11), 6156–6183.CrossRef
28.
Zurück zum Zitat Yang, H., Jiang, S., Shen, W., & Lei, Z. (2018). Certificateless provable group shared data possession with comprehensive privacy preservation for cloud storage. Future Internet, 10(6), 49.CrossRef Yang, H., Jiang, S., Shen, W., & Lei, Z. (2018). Certificateless provable group shared data possession with comprehensive privacy preservation for cloud storage. Future Internet, 10(6), 49.CrossRef
29.
Zurück zum Zitat Yu, Y., Mu, Y., Ni, J., Deng, J., & Huang, K. (2014). Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage. In International conference on network and system security-NSS 2014 (pp. 28–40). Springer. Yu, Y., Mu, Y., Ni, J., Deng, J., & Huang, K. (2014). Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage. In International conference on network and system security-NSS 2014 (pp. 28–40). Springer.
30.
Zurück zum Zitat Zhang, G., & Wang, S. (2008). A certificateless signature and group signature schemes against malicious PKG. In International conference on advanced information networking and applications-AINA 2008, 334–341. Zhang, G., & Wang, S. (2008). A certificateless signature and group signature schemes against malicious PKG. In International conference on advanced information networking and applications-AINA 2008, 334–341.
31.
Zurück zum Zitat Zhang, L., Zhang, F., & Wu, W. (2017). A provably secure ring signature scheme in certificateless cryptography. CoRR. arXiv:1712.09145. Zhang, L., Zhang, F., & Wu, W. (2017). A provably secure ring signature scheme in certificateless cryptography. CoRR. arXiv:​1712.​09145.
32.
Zurück zum Zitat Zhang, Y., Xu, C., Yu, S., Li, H., & Zhang, X. (2015). SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Transactions on Computational Social Systems, 2(4), 159–170.CrossRef Zhang, Y., Xu, C., Yu, S., Li, H., & Zhang, X. (2015). SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Transactions on Computational Social Systems, 2(4), 159–170.CrossRef
Metadaten
Titel
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users
verfasst von
Ge Wu
Yi Mu
Willy Susilo
Fuchun Guo
Futai Zhang
Publikationsdatum
19.02.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06208-1

Weitere Artikel der Ausgabe 3/2019

Wireless Personal Communications 3/2019 Zur Ausgabe

Neuer Inhalt