Data Integrity Auditing without Private Key Storage for Secure Cloud Storage

被引:40
|
作者
Shen, Wenting [1 ]
Qin, Jing [1 ,2 ]
Yu, Jia [3 ,4 ]
Hao, Rong [3 ]
Hu, Jiankun [5 ]
Ma, Jixin [6 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 10078, Peoples R China
[3] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[5] Univ New South Wales, Australian Def Force Acad UNSW ADFA, Sch Engn & IT, Cyber Secur Lab, Canberra, ACT 2052, Australia
[6] Univ Greenwich, Comp & Math Sci Dept, London SE10 9LS, England
基金
中国国家自然科学基金;
关键词
Cloud storage; data integrity auditing; data security; biometric data; DATA POSSESSION CHECKING; SHARED DATA;
D O I
10.1109/TCC.2019.2921553
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Using cloud storage services, users can store their data in the cloud to avoid the expenditure of local data storage and maintenance. To ensure the integrity of the data stored in the cloud, many data integrity auditing schemes have been proposed. In most, if not all, of the existing schemes, a user needs to employ his private key to generate the data authenticators for realizing the data integrity auditing. Thus, the user has to possess a hardware token (e.g., USB token, smart card) to store his private key and memorize a password to activate this private key. If this hardware token is lost or this password is forgotten, most of the current data integrity auditing schemes would be unable to work. In order to overcome this problem, we propose a new paradigm called data integrity auditing without private key storage and design such a scheme. In this scheme, we use biometric data (e.g., iris scan, fingerprint) as the user's fuzzy private key to avoid using the hardware token. Meanwhile, the scheme can still effectively complete the data integrity auditing. We utilize a linear sketch with coding and error correction processes to confirm the identity of the user. In addition, we design a new signature scheme which not only supports blockless verifiability, but also is compatible with the linear sketch. The security proof and the performance analysis show that our proposed scheme achieves desirable security and efficiency.
引用
收藏
页码:1408 / 1421
页数:14
相关论文
共 50 条
  • [21] Towards an analysis of data accountability and auditing for secure cloud data storage
    Prassanna, J.
    Punitha, K.
    Neelanarayanan, V
    BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 543 - 550
  • [22] Secure Storage of Electronic Health Records on Cloud Using Integrity Verification Auditing
    Srinivasan, S.
    Keerthi, Kethineni
    Tejaswi, Gummadi
    Shobana, Kodali Divya
    REVISTA GEINTEC-GESTAO INOVACAO E TECNOLOGIAS, 2021, 11 (02): : 2132 - 2141
  • [23] Data Integrity and Data Dynamics with Secure Storage Service in Cloud
    Nithiavathy, R.
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [24] Secure Data Deduplication and Efficient Storage Utilization in Cloud Servers Using Encryption, Compression and Integrity Auditing
    Nair, Arya S.
    Radhakrishnan, B.
    Jayakrishnan, R. P.
    Kanthan, Padma Suresh Lekshmi
    SOFT COMPUTING SYSTEMS, ICSCS 2018, 2018, 837 : 326 - 334
  • [25] Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage
    Huiying Hou
    Jia Yu
    Hanlin Zhang
    Yan Xu
    Rong Hao
    Cluster Computing, 2018, 21 : 1849 - 1863
  • [26] Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage
    Hou, Huiying
    Yu, Jia
    Zhang, Hanlin
    Xu, Yan
    Hao, Rong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (04): : 1849 - 1863
  • [27] On the security of auditing mechanisms for secure cloud storage
    Yu, Yong
    Niu, Lei
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 127 - 132
  • [28] MHB*T based dynamic data integrity auditing in cloud storage
    Luo, Wei
    Ma, Wenping
    Gao, Juntao
    Cluster Computing, 2021, 24 (03) : 2115 - 2132
  • [29] A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System
    Huang, Pei
    Fan, Kai
    Yang, Hanzhe
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    IEEE ACCESS, 2020, 8 (94780-94794) : 94780 - 94794
  • [30] MHB*T based dynamic data integrity auditing in cloud storage
    Luo, Wei
    Ma, Wenping
    Gao, Juntao
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 2115 - 2132