Browse > Article
http://dx.doi.org/10.3837/tiis.2019.11.021

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage  

Zhang, Yinghui (National Engineering Laboratory for Wireless Security)
Zhang, Tiantian (National Engineering Laboratory for Wireless Security)
Guo, Rui (National Engineering Laboratory for Wireless Security)
Xu, Shengmin (Secure Mobile Centre, School of Information Systems, Singapore Management University)
Zheng, Dong (National Engineering Laboratory for Wireless Security)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.11, 2019 , pp. 5653-5672 More about this Journal
Abstract
In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.
Keywords
Identity privacy preserving; traceability; public auditing; user revocation; cloud storage;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. Luo, M. Xu, S. Fu, D. Wang, and J. Deng, "Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation," in Proc. of IEEE Trustcom/BigDataSE/ISPA, pp. 434-442, 2015.
2 A. Fu, S. Yu, Y. Zhang, H. Wang, C. Huang, "NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users," IEEE Transactions on Big Data, pp. 1-1, 2017.
3 B. Wang, B. Li, and H. Li, "Oruta: privacy-preserving public auditing for shared data in the cloud," IEEE Transactions on Cloud Computing, vol. 2, no. 1, pp. 43-56, January, 2014.   DOI
4 L. Huang, G. Zhang, A. Fu, "Privacy-Preserving Public Auditing for Non-Manager Group," in Proc. of IEEE ICC, pp. 1-6, 2017.
5 L. Huang, G. Zhang, A. Fu, "Privacy-Preserving Public Auditing for Non-Manager Group," Wireless Personal Communication, vol. 100, no. 4, pp. 1277-1294, 2018.   DOI
6 J. Xiong, Y. Zhang, X. Li, M. Lin, Z. Yao, "RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data," Mobile Networks and Applications, vol. 23, no. 3, pp. 650-663, 2018.   DOI
7 Y. Zhang, D. Zheng, R. Deng, "Security and privacy in smart health: Efficient policy-hiding attribute-based access control," IEEE Internet of Things Journal, vol. 5, no. 3, pp. 2130-2145, 2018.   DOI
8 D. Wang, D. He, P. Wang, and C. Chu, "Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment," IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 4, pp. 428-442, 2015.   DOI
9 D. Wang, P. Wang, "On the Anonymity of Two-Factor Authentication Schemes for Wireless Sensor Networks: Attacks, Principle and Solutions," Computer Networks, vol. 73, no. 14, pp. 41-57, 2014.   DOI
10 W. Shen, J. Qin, J. Yu, R. Hao, J. Hu, "Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage," IEEE Transactions on Information Forensics and Security, vol. 14, pp. 331-346, 2018.   DOI
11 Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, "Mutual verifiable provable data auditing in public cloud storage," Journal of Internet Technology, vol. 16, no. 2, pp. 317-323, 2015.   DOI
12 Y. Zhang, R. Deng, X. Liu, and D. Zheng, "Outsourcing service fair payment based on blockchain and its applications in cloud computing," IEEE Transactions on Services Computing, pp. 1-1, 2018.
13 Y. Zhang, R. Deng, X. Liu, and D. Zheng, "Blockchain based Efficient and Robust Fair Payment for Outsourcing Services in Cloud Computing," Information Sciences, vol. 462, pp. 262-277, 2018.   DOI
14 Y. Zhang, R. Deng, J. Shu, K. Yang, D. Zheng, "TKSE: Trustworthy Keyword Search over Encrypted Data with Two-side Verifiability via Blockchain," IEEE Access, vol. 6, pp. 31077-31087, 2018.   DOI
15 J. Yuan and S. Yu, "Public integrity auditing for dynamic data sharing with multiuser modification," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1717-1726, August, 2015.   DOI
16 Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546-2559, 2016.   DOI
17 G. Ateniese et al., "Provable data possession at untrusted stores," in Proc. of ACM Conference on Computer & Communications Security, pp. 598-609, 2007.
18 H. Shacham, and B. Waters, "Compact proofs of retrievability," in Proc. of Cryptology-ASIACRYPT 2008, pp. 90-107, 2008.
19 D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," Journal of Cryptology, vol. 17, no. 4, pp. 297-319, 2004.   DOI
20 A. Hu, R. Jiang, B. Bhargava, "Identity-Preserving Public Integrity Checking with Dynamic Groups for Cloud Storage," IEEE Transactions on Services Computing, pp. 1-1, July, 2018.
21 Y. Zhang, J. Yu, R. Hao, C. Wang, and K. Ren, "Enabling efficient user revocation in identity-based cloud storage auditing for shared big data," IEEE Transactions on Dependable and Secure Computing, pp. 1-1, 2018.
22 J. Shen, J. Shen, X. Chen, X. Huang, W. Susilo, "An efficient public auditing protocol with novel dynamic structure for cloud data," IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2402-2415, 2017.   DOI
23 T. Jiang, X. Chen, and J. Ma, "Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation," IEEE Transactions on Computers, vol. 65, no. 8, pp. 2363-2373, 2016.   DOI
24 Y. Zhang, R. Deng, D. Zheng, J. Li, P Wu, and J. Cao, "Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT," IEEE Transactions on Industrial Informatics, vol. 15, pp. 5099-5108, 2019.   DOI
25 B. Kuang, A. Fu, S. Yu, G. Yang, M. Su, Y. Zhang, "ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms," IEEE Internet of Things Journal, vol. 6, pp. 8372-8383, 2019.   DOI
26 Y. Yu, M. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, and G. Min, "Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage," IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 767-778, 2016.   DOI
27 Q. Wang, C. Wang, K. Ren, W. Lou, J. Lin, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE transactions on parallel and distributed systems, vol. 22, no. 5, pp. 847-859, 2011.   DOI
28 B. Wang, B. Li, and H. Li, "Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud," IEEE Transactions on Services Computing, vol. 8, no. 1, pp. 92-106, 2015.   DOI
29 Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, I. You, "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing," Information Sciences, vol. 379, pp. 42-61, 2017.   DOI
30 S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attack," SIAM J. Comput., vol. 17, no. 2, pp. 281-308, 1998.   DOI
31 Y. Zhang, A. Wu, and D. Zheng, "Efficient and privacy-aware attribute-based data sharing in mobile cloud computing," Journal of Ambient Intelligence and Humanized Computing, vol. 9, no. 4, pp. 1039-1048, 2018.   DOI
32 X. Li, H. Qian, J. Li, "Democratic group signatures with threshold traceability," Journal of Shanghai Jiaotong University, vol. 14, no. 1, pp. 98-101, 2009.   DOI
33 G. He, X. Li, Q. Li, D. Zheng, "Efficient democratic group signatures with threshold traceability," Journal of Shanghai Jiaotong University, vol. 16, no. 5, pp. 530-532, 2011.   DOI
34 A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.   DOI
35 Z. Zhu and R. Jiang, "A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud," IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 1, pp. 40-50, January, 2016.   DOI