Nothing Special   »   [go: up one dir, main page]

Skip to main content

Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11449))

Included in the following conference series:

Abstract

The cloud can provide unlimited storage space to users via the Internet. Unlike locally data storing, users will lose the direct control of the data after outsourcing it to the cloud. Moreover, the cloud is an untrusted entity. It is possible that the cloud may try to extract, discard and destroy users’ data due to benefits. Hence, the data security in cloud computing needs to be well guaranteed. In this paper, we propose a privacy-preserving data outsourcing scheme with integrity auditing for lightweight devices in cloud computing. On the one hand, the blind signature is used in the proposed scheme to delegate the generation of users’ data signatures to the TPA. On the other hand, based on the property of the BLS signature, the blinded signatures received from the TPA can be verified by the user and the data integrity stored in the cloud can be audited by the TPA. In addition, the proposed scheme supports batch operation. Security analysis shows that the proposed scheme achieves the properties of correctness, privacy-preserving and non-forgeability. Performance analysis indicates that the proposed scheme can be performed with high efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ateniese, G., et al.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609 (2007)

    Google Scholar 

  2. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distributed Syst. 25(1), 222–233 (2013)

    Article  Google Scholar 

  3. Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, Boston (1983). https://doi.org/10.1007/978-1-4757-0602-4_18

    Chapter  Google Scholar 

  4. Chen, X., Li, J., Huang, X., Ma, J., Lou, W.: New publicly verifiable databases with efficient updates. IEEE Trans. Dependable Secure Comput. 12(5), 546–556 (2015)

    Article  Google Scholar 

  5. Chen, X., Li, J., Weng, J., Ma, J., Lou, W.: Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 65(10), 3184–3195 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  6. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_30

    Chapter  Google Scholar 

  7. Dikaiakos, M.D., Katsaros, D., Mehra, P., Pallis, G., Vakali, A.: Cloud computing: distributed internet computing for it and scientific research. IEEE Internet Comput. 13(5), 10–13 (2009)

    Article  Google Scholar 

  8. Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109–127. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00457-5_8

    Chapter  MATH  Google Scholar 

  9. Juels, A., Kaliski, B.S.: PORs: proofs of retrievability for large files. In: ACM Conference on Computer and Communications Security, pp. 584–597 (2007)

    Google Scholar 

  10. Lins, S., Schneider, S., Sunyaev, A.: Trust is good, control is better: creating secure clouds by continuous auditing. IEEE Trans. Cloud Comput. 6, 890–903 (2016)

    Article  Google Scholar 

  11. Lins, S., Grochol, P., Schneider, S., Sunyaev, A.: Dynamic certification of cloud services: trust, but verify!. IEEE Secur. Priv. Mag. 14(2), 66–71 (2016)

    Article  Google Scholar 

  12. Liu, D., Shen, J., Wang, A., Wang, C.: Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks. Int. J. Sens. Netw. 27(2), 95–102 (2018)

    Article  Google Scholar 

  13. Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distributed Syst. 24(6), 1182–1191 (2013)

    Article  Google Scholar 

  14. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing-the business perspective. Decis. Support Syst. 51(1), 176–189 (2011)

    Article  Google Scholar 

  15. Mell, P., Grance, T.: The NIST definition of cloud computing. Commun. ACM 53(6), 50 (2011)

    Google Scholar 

  16. Moritoh, Y., Imai, Y., Inomo, H., Shiraki, W.: A cloud service on distributed multiple servers for cooperative learning and emergency communication. Commun. Comput. Inf. Sci. 188, 377–390 (2011)

    Google Scholar 

  17. Sebe, F., Domingo-ferrer, J., Martnez-ballest, A., Deswarte, Y., Quisquater, J.J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)

    Article  Google Scholar 

  18. Shen, J., Liu, D., Bhuiyan, M.Z.A., Shen, J., Sun, X., Castiglione, A.: Secure verifiable database supporting efficient dynamic operations in cloud computing. IEEE Trans. Emerg. Top. Comput. (2017). https://doi.org/10.1109/TETC.2017.2776402

  19. Shen, J., Liu, D., Lai, C.F., Ren, Y., Wang, J., Sun, X.: A secure identity-based dynamic group data sharing scheme for cloud computing. J. Internet Technol. 18(4), 833–842 (2017)

    Google Scholar 

  20. Shen, J., Wang, C., Wang, A., Ji, S., Zhang, Y.: A searchable and verifiable data protection scheme for scholarly big data. IEEE Trans. Emerg. Top. Comput. (2018). https://doi.org/10.1109/TETC.2018.2830368

  21. Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Trans. Dependable Secure Comput. 1, 1 (2017)

    Google Scholar 

  22. Shi, J., Li, H., Zhou, L.: The technical security issues in cloud computing. Int. J. Inf. Commun. Technol. 5(3–4), 109–116 (2013)

    Google Scholar 

  23. Sun, W., et al.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distributed Syst. 25(11), 3025–3035 (2014)

    Article  Google Scholar 

  24. Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2012)

    Article  Google Scholar 

  25. Wang, C., Shen, J., Lai, C.F., Huang, R., Wei, F.: Neighborhood trustworthiness based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks. In: Practice and Experience, Concurrency and Computation (2018)

    Google Scholar 

  26. Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  27. Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of International Conference on Computer Communication, pp. 451–459 (2012)

    Google Scholar 

  28. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for storage security in cloud computing. In: Proceedings of International Conference on Computer Communications, pp. 1–9 (2010)

    Google Scholar 

  29. Wang, L., et al.: Cloud computing: a perspective study. New Gener. Comput. 28(2), 137–146 (2010)

    Article  MATH  Google Scholar 

  30. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distributed Syst. 22(5), 847–859 (2011)

    Article  Google Scholar 

  31. Yang, J., Chen, Z.: Cloud computing research and security issues. In: Proceedings of the International Conference on Computational Intelligence and Software Engineering, pp. 1–3 (2010)

    Google Scholar 

  32. Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distributed Syst. 24(9), 1717–1726 (2013)

    Article  Google Scholar 

  33. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of International Conference on Computer Communication, pp. 1–9 (2010)

    Google Scholar 

  34. Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-45067-X_27

    Chapter  Google Scholar 

  35. Zhou, T., Shen, J., Li, X., Wang, C., Shen, J.: Quantum cryptography for the future internet and the security analysis. Secur. Commun. Netw. (2018). https://doi.org/10.1155/2018/8214619

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grant No. U1836115, No. 61672295, and No. 61672290, the Natural Science Foundation of Jiangsu Province under Grant No. BK20181408, the Foundation of Guizhou Provincial Key Laboratory of Public Big Data under Grant No. 2018BDKFJJ003, Guangxi Key Laboratory of Cryptography and Information Security under Grant No. GCIS201715, the State Key Laboratory of Information Security under Grant No. 2017-MS-10, the CICAEET fund, and the PAPD fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, D., Shen, J., Chen, Y., Wang, C., Zhou, T., Wang, A. (2019). Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing. In: Guo, F., Huang, X., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2018. Lecture Notes in Computer Science(), vol 11449. Springer, Cham. https://doi.org/10.1007/978-3-030-14234-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-14234-6_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-14233-9

  • Online ISBN: 978-3-030-14234-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics