Browse > Article
http://dx.doi.org/10.3837/tiis.2016.07.025

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data  

Shen, Wenting (College of Information Engineering, Qingdao University)
Yu, Jia (College of Information Engineering, Qingdao University)
Yang, Guangyang (College of Information Engineering, Qingdao University)
Zhang, Yue (College of Information Engineering, Qingdao University)
Fu, Zhangjie (School of Computer and Software, Nanjing University of Information Science & Technology)
Hao, Rong (College of Information Engineering, Qingdao University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.7, 2016 , pp. 3319-3338 More about this Journal
Abstract
Cloud storage is becoming more and more popular because of its elasticity and pay-as-you-go storage service manner. In some cloud storage scenarios, the data that are stored in the cloud may be shared by a group of users. To verify the integrity of cloud data in this kind of applications, many auditing schemes for shared cloud data have been proposed. However, all of these schemes do not consider the access authorization problem for users, which makes the revoked users still able to access the shared cloud data belonging to the group. In order to deal with this problem, we propose a novel public auditing scheme for shared cloud data in this paper. Different from previous work, in our scheme, the user in a group cannot any longer access the shared cloud data belonging to this group once this user is revoked. In addition, we propose a new random masking technique to make our scheme preserve both data privacy and identity privacy. Furthermore, our scheme supports to enroll a new user in a group and revoke an old user from a group. We analyze the security of the proposed scheme and justify its performance by concrete implementations.
Keywords
Cloud Storage; Public Auditing; Data Privacy; Batch Verification;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Ren, C. Wang and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, pp. 69-73, 2012. Article (CrossRef Link)   DOI
2 D. Song, E. Shi, I. Fischer and U. Shankar, “Cloud Data Protection for the Masses,” IEEE Computer, vol. 45, no. 1, pp. 39-45, 2012. Article (CrossRef Link)   DOI
3 M. Arrington, "Gmail Disaster: Reports of Mass Email Deletions," Online at http://techcrunch.com/2006/12/28/gmail-disaster-reports-of-mass-email-deletions/, 2006. Article (CrossRef Link)
4 Amazon S3 Team. Amazon S3 Availability Event: July 20, 2008. Online at http://status.aws.amazon.com/s3-20080720.html, 2008. Article (CrossRef Link)
5 K. Yang and X. Jia, “Data storage auditing service in cloud computing: challenges, methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409-428, 2012. Article (CrossRef Link)   DOI
6 G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, "Provable Data Possession at Untrusted Stores," in Proc. of ACM CCS 2007, pp. 598-610, 2007. Article (CrossRef Link)
7 H. Shacham and B. Waters, "Compact Proofs of Retrievability," in Proc. of ASIACRYPT 2008, Springer-Verlag, pp. 90-107, 2008. Article (CrossRef Link)
8 C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in Proc. of ACM/ IEEE IWQoS. 2009, pp. 1-9, 2009. Article (CrossRef Link)
9 N. Cao, S. Yu, Z. Yang, W. Lou and Y. T. Hou, "LT Codes-based Secure and Reliable Cloud Storage Service," in Proc. of IEEE INFOCOM 2012, pp. 693-701, March 25-30, 2012. Article (CrossRef Link)
10 C. Wang, S. Chow, Q. Wang, K. Ren and W. Lou, “Privacy Preserving Public Auditing for Secure Cloud Storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, 2013. Article (CrossRef Link)   DOI
11 S. G. Worku, C. Xu, J. Zhao and X. He, “Secure and efficient privacy-preserving public auditing scheme for cloud storage,” Computers and Electrical Engineering, vol. 40, no. 5, pp. 1703-1713, 2014. Article (CrossRef Link)   DOI
12 C. Erway, A. Küpçü, C. Papamanthou and R. Tamassia, "Dynamic Provable Data Possession," in Proc. of the 16th ACM Conference on Computer and Communications Security (CCS'09), pp. 213-222, 2009. Article (CrossRef Link)
13 Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu and S. S. Yau, "Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds," in Proc. of ACM SAC 2011, pp. 1550-1557, 2011. Article (CrossRef Link)
14 Q. Wang, C. Wang and K. Ren, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011. Article (CrossRef Link)   DOI
15 Z. Mo, Y. Zhou and S. Chen, "A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity," in Proc. of Communication(ICC), 2012 IEEE Information Conference on IEEE, pp. 912-916, June 10-15, 2012. Article (CrossRef Link)
16 C. Liu, J. Chen and T. Yang, “Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-grained Updates,” IEEE Transactions on Parallel and Distributed Systems, vol.25, no.9, pp. 2234-2244, 2014. Article (CrossRef Link)   DOI
17 Y. Zhang and M. Blanton, "Efficient Dynamic Provable Possession of Remote Data via Balanced Update Trees," in Proc. of Department of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, pp.183-194, 2013. Article (CrossRef Link)
18 J. Yu, K. Ren, C. Wang and V. Varadharajan, “Enabling Cloud Storage Auditing with Key-Exposure Resistance,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp.1167-1179, 2015. Article (CrossRef Link)   DOI
19 J. Yu, R. Hao, H. Zhao, M. Shu, and J. Fan, “IRIBE: Intrusion-Resilient Identity-Based Encryption,” Information Sciences, Vol. 329, pp. 90-104, 2016. Article (CrossRef Link)   DOI
20 J. Yu, K. Ren, and C. Wang, “Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates,” IEEE Transactions on Information Forensics and Security, Vol. 11, No. 5, pp. 1362 – 1375, 2016. Article (CrossRef Link)   DOI
21 G. Yang, J. Yu, W. Shen, Q. Su, Z. Fu, and R. Hao, “Enabling Public Auditing for Shared Data in Cloud Storage Supporting Identity Privacy and Traceability,” Journal of Systems and Software, Vol. 113, pp. 130-139, 2016. Article (CrossRef Link)   DOI
22 Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, Vol. 16, No. 2, pp. 317-323, 2015. Article (CrossRef Link)   DOI
23 H. Wang, Q. Wu, B. Qin and J. Domingo-Ferrer, “Identity-based remote data possession checking in public clouds,” Information Security, IET, vol.8, no.2, pp.114-121, 2014. Article (CrossRef Link)   DOI
24 B. Wang, B. Li and H. Li, "Public Auditing for Shared Data with Efficient User Revocation in the Cloud," in Proc. of IEEE INFOCOM 2013, pp. 2904-2912, 2013. Article (CrossRef Link)
25 B. Wang, H. Li and M. Li, "Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics," in Proc. of Communications (ICC), 2013 IEEE International Conference on IEEE, pp. 1946-1950, June 9-13, 2013.Article (CrossRef Link)
26 J. Yuan and S. Yu, "Efficient Public Integrity Checking for Cloud Data Sharing with Multi-user Modification," in Proc. of IEEE INFOCOM 2014, pp. 2121-2129, April 27-May 2, 2014. Article (CrossRef Link)
27 B. Wang, B. Li and H. Li, "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud," in Proc. of IEEE Cloud 2012, pp. 295-302, June 24-29, 2012. Article (CrossRef Link)