Genuine and secure public auditing for the outsourced data in cloud. (24th July 2019)
- Record Type:
- Journal Article
- Title:
- Genuine and secure public auditing for the outsourced data in cloud. (24th July 2019)
- Main Title:
- Genuine and secure public auditing for the outsourced data in cloud
- Authors:
- Zhang, Jianhong
Meng, Hongxin - Abstract:
- In cloud storage, the most common concerns for users are data integrity, confidentiality and availability. Recently, many data integrity auditing schemes have been proposed, some of which achieved privacy-preserving public auditing, some of which realised data sharing and group dynamic, and some of which supported data dynamic. However, as far as we know, there does not exist a practical auditing scheme which can simultaneously realise all the functions mentioned above; In addition, all the existing schemes adopt the method of computing message authentication code (MAC) by users to achieve the following data integrity auditing, nevertheless, it is a arduous task to compute MACs for these cloud users with constrained computing and storage capabilities. In this paper, we propose a novel privacy-preserving public auditing scheme for shared data in the cloud, which can also support data dynamic operation and group dynamic. First, we bring proxy signature into the existing auditing scheme. The cloud user can delegate the computation of MACs to a cloud computing server, so that the user's burden would be greatly reduced; second, by introducing a Lagrange interpolating polynomial, our scheme realises the identity privacy-preserving in the precondition of almost no addition of any new computation and less storage space, moreover it makes group dynamic simple; third, we make an index-switch table and combine it with the Merkle hash tree to realise the practical and secure dynamicIn cloud storage, the most common concerns for users are data integrity, confidentiality and availability. Recently, many data integrity auditing schemes have been proposed, some of which achieved privacy-preserving public auditing, some of which realised data sharing and group dynamic, and some of which supported data dynamic. However, as far as we know, there does not exist a practical auditing scheme which can simultaneously realise all the functions mentioned above; In addition, all the existing schemes adopt the method of computing message authentication code (MAC) by users to achieve the following data integrity auditing, nevertheless, it is a arduous task to compute MACs for these cloud users with constrained computing and storage capabilities. In this paper, we propose a novel privacy-preserving public auditing scheme for shared data in the cloud, which can also support data dynamic operation and group dynamic. First, we bring proxy signature into the existing auditing scheme. The cloud user can delegate the computation of MACs to a cloud computing server, so that the user's burden would be greatly reduced; second, by introducing a Lagrange interpolating polynomial, our scheme realises the identity privacy-preserving in the precondition of almost no addition of any new computation and less storage space, moreover it makes group dynamic simple; third, we make an index-switch table and combine it with the Merkle hash tree to realise the practical and secure dynamic operations of shared data by group users; fourth, in our scheme, the cloud storage server will add its private key in producing the proof information to protect the data privacy and resist the active attack. Theoretical analysis demonstrates our scheme is provably secure. … (more)
- Is Part Of:
- International journal of high performance computing and networking. Volume 14:Number 2(2019)
- Journal:
- International journal of high performance computing and networking
- Issue:
- Volume 14:Number 2(2019)
- Issue Display:
- Volume 14, Issue 2 (2019)
- Year:
- 2019
- Volume:
- 14
- Issue:
- 2
- Issue Sort Value:
- 2019-0014-0002-0000
- Page Start:
- 183
- Page End:
- 196
- Publication Date:
- 2019-07-24
- Subjects:
- data sharing -- privacy-preserving -- data dynamic -- group dynamic -- active attack -- proxy signature -- Lagrange interpolating polynomial
High performance computing -- Periodicals
Computer networks -- Periodicals
High performance computing
Periodicals
004.05 - Journal URLs:
- http://www.inderscience.com/jhome.php?jcode=ijhpcn ↗
http://www.metapress.com/openurl.asp?genre=journal&issn=1740-0562 ↗
http://www.inderscience.com/ ↗ - Languages:
- English
- ISSNs:
- 1740-0562
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - BLDSS-3PM
British Library STI - ELD Digital store - Ingest File:
- 11324.xml