Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage |
Zhang, Yinghui
(National Engineering Laboratory for Wireless Security)
Zhang, Tiantian (National Engineering Laboratory for Wireless Security) Guo, Rui (National Engineering Laboratory for Wireless Security) Xu, Shengmin (Secure Mobile Centre, School of Information Systems, Singapore Management University) Zheng, Dong (National Engineering Laboratory for Wireless Security) |
1 | Y. Luo, M. Xu, S. Fu, D. Wang, and J. Deng, "Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation," in Proc. of IEEE Trustcom/BigDataSE/ISPA, pp. 434-442, 2015. |
2 | A. Fu, S. Yu, Y. Zhang, H. Wang, C. Huang, "NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users," IEEE Transactions on Big Data, pp. 1-1, 2017. |
3 | B. Wang, B. Li, and H. Li, "Oruta: privacy-preserving public auditing for shared data in the cloud," IEEE Transactions on Cloud Computing, vol. 2, no. 1, pp. 43-56, January, 2014. DOI |
4 | L. Huang, G. Zhang, A. Fu, "Privacy-Preserving Public Auditing for Non-Manager Group," in Proc. of IEEE ICC, pp. 1-6, 2017. |
5 | L. Huang, G. Zhang, A. Fu, "Privacy-Preserving Public Auditing for Non-Manager Group," Wireless Personal Communication, vol. 100, no. 4, pp. 1277-1294, 2018. DOI |
6 | J. Xiong, Y. Zhang, X. Li, M. Lin, Z. Yao, "RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data," Mobile Networks and Applications, vol. 23, no. 3, pp. 650-663, 2018. DOI |
7 | Y. Zhang, D. Zheng, R. Deng, "Security and privacy in smart health: Efficient policy-hiding attribute-based access control," IEEE Internet of Things Journal, vol. 5, no. 3, pp. 2130-2145, 2018. DOI |
8 | D. Wang, D. He, P. Wang, and C. Chu, "Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment," IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 4, pp. 428-442, 2015. DOI |
9 | D. Wang, P. Wang, "On the Anonymity of Two-Factor Authentication Schemes for Wireless Sensor Networks: Attacks, Principle and Solutions," Computer Networks, vol. 73, no. 14, pp. 41-57, 2014. DOI |
10 | W. Shen, J. Qin, J. Yu, R. Hao, J. Hu, "Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage," IEEE Transactions on Information Forensics and Security, vol. 14, pp. 331-346, 2018. DOI |
11 | Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, "Mutual verifiable provable data auditing in public cloud storage," Journal of Internet Technology, vol. 16, no. 2, pp. 317-323, 2015. DOI |
12 | Y. Zhang, R. Deng, X. Liu, and D. Zheng, "Outsourcing service fair payment based on blockchain and its applications in cloud computing," IEEE Transactions on Services Computing, pp. 1-1, 2018. |
13 | Y. Zhang, R. Deng, X. Liu, and D. Zheng, "Blockchain based Efficient and Robust Fair Payment for Outsourcing Services in Cloud Computing," Information Sciences, vol. 462, pp. 262-277, 2018. DOI |
14 | Y. Zhang, R. Deng, J. Shu, K. Yang, D. Zheng, "TKSE: Trustworthy Keyword Search over Encrypted Data with Two-side Verifiability via Blockchain," IEEE Access, vol. 6, pp. 31077-31087, 2018. DOI |
15 | J. Yuan and S. Yu, "Public integrity auditing for dynamic data sharing with multiuser modification," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1717-1726, August, 2015. DOI |
16 | Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546-2559, 2016. DOI |
17 | G. Ateniese et al., "Provable data possession at untrusted stores," in Proc. of ACM Conference on Computer & Communications Security, pp. 598-609, 2007. |
18 | H. Shacham, and B. Waters, "Compact proofs of retrievability," in Proc. of Cryptology-ASIACRYPT 2008, pp. 90-107, 2008. |
19 | D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," Journal of Cryptology, vol. 17, no. 4, pp. 297-319, 2004. DOI |
20 | A. Hu, R. Jiang, B. Bhargava, "Identity-Preserving Public Integrity Checking with Dynamic Groups for Cloud Storage," IEEE Transactions on Services Computing, pp. 1-1, July, 2018. |
21 | Y. Zhang, J. Yu, R. Hao, C. Wang, and K. Ren, "Enabling efficient user revocation in identity-based cloud storage auditing for shared big data," IEEE Transactions on Dependable and Secure Computing, pp. 1-1, 2018. |
22 | J. Shen, J. Shen, X. Chen, X. Huang, W. Susilo, "An efficient public auditing protocol with novel dynamic structure for cloud data," IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2402-2415, 2017. DOI |
23 | T. Jiang, X. Chen, and J. Ma, "Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation," IEEE Transactions on Computers, vol. 65, no. 8, pp. 2363-2373, 2016. DOI |
24 | Y. Zhang, R. Deng, D. Zheng, J. Li, P Wu, and J. Cao, "Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT," IEEE Transactions on Industrial Informatics, vol. 15, pp. 5099-5108, 2019. DOI |
25 | B. Kuang, A. Fu, S. Yu, G. Yang, M. Su, Y. Zhang, "ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms," IEEE Internet of Things Journal, vol. 6, pp. 8372-8383, 2019. DOI |
26 | Y. Yu, M. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, and G. Min, "Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage," IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 767-778, 2016. DOI |
27 | Q. Wang, C. Wang, K. Ren, W. Lou, J. Lin, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE transactions on parallel and distributed systems, vol. 22, no. 5, pp. 847-859, 2011. DOI |
28 | B. Wang, B. Li, and H. Li, "Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud," IEEE Transactions on Services Computing, vol. 8, no. 1, pp. 92-106, 2015. DOI |
29 | Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, I. You, "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing," Information Sciences, vol. 379, pp. 42-61, 2017. DOI |
30 | S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attack," SIAM J. Comput., vol. 17, no. 2, pp. 281-308, 1998. DOI |
31 | Y. Zhang, A. Wu, and D. Zheng, "Efficient and privacy-aware attribute-based data sharing in mobile cloud computing," Journal of Ambient Intelligence and Humanized Computing, vol. 9, no. 4, pp. 1039-1048, 2018. DOI |
32 | X. Li, H. Qian, J. Li, "Democratic group signatures with threshold traceability," Journal of Shanghai Jiaotong University, vol. 14, no. 1, pp. 98-101, 2009. DOI |
33 | G. He, X. Li, Q. Li, D. Zheng, "Efficient democratic group signatures with threshold traceability," Journal of Shanghai Jiaotong University, vol. 16, no. 5, pp. 530-532, 2011. DOI |
34 | A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979. DOI |
35 | Z. Zhu and R. Jiang, "A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud," IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 1, pp. 40-50, January, 2016. DOI |