Cloud data auditing with designated verifier

被引:10
|
作者
Worku, Solomon Guadie [1 ]
Xu, Chunxiang [1 ]
Zhao, Jining [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud data storage; designated verifier; data privacy; storage correctness; cloud computing; SIGNATURE;
D O I
10.1007/s11704-013-3138-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build for the last few years. However, in a public auditing scheme everybody does verification of data and a possibility of leaking some secrete information to the public verifiers is an issue that data owners are unhappywith this scenario. For example, the data owner does not want anybody else to know he has the data stored in the cloud server. Motivated by the issue of privacy associated with public auditing system, we proposed a designated verifier auditing (DVA) scheme based on Steinfeld et al.'s universal designated verifier (DV) signature scheme. Our DVA scheme authorizes a third party auditor with private verification capability. It provides private verification because the scheme involves private key of the verifier. Moreover, we present the batch auditing scheme to improve auditing efficiency. Through rigorous security analysis we showed that our scheme is provably secure in the random oraclemodel assuming that the computational Diffie-Hellman (CDH) problem is hard over the group of bilinear maps.
引用
收藏
页码:503 / 512
页数:10
相关论文
共 50 条
  • [1] Cloud data auditing with designated verifier
    Solomon Guadie Worku
    Chunxiang Xu
    Jining Zhao
    Frontiers of Computer Science, 2014, 8 : 503 - 512
  • [2] Certificateless Data Integrity Auditing in Cloud Storage with a Designated Verifier and User Privacy Preservation
    Bian, Genqing
    Guo, Xusen
    Li, Rong
    Qu, Wenjing
    Zhao, Yu
    ELECTRONICS, 2022, 11 (23)
  • [3] Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit
    Li, Ruifeng
    Wang, Xu An
    Yang, Haibin
    Niu, Ke
    Tang, Dianhua
    Yang, Xiaoyuan
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 8079 - 8089
  • [4] Incentive Public Auditing Scheme with Identity-Based Designated Verifier in Cloud
    Shao, Bilin
    Zhang, Li
    Bian, Genqing
    ELECTRONICS, 2023, 12 (06)
  • [5] Cloud Data Integrity Using a Designated Public Verifier
    Rizvi, Syed
    Cover, Katie
    Razaque, Abdul
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1361 - 1366
  • [6] Remote Data Checking With a Designated Verifier in Cloud Storage
    Yan, Hao
    Li, Jiguo
    Zhang, Yichen
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1788 - 1797
  • [7] LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs
    Zhang, Xiaojun
    Huang, Chao
    Zhang, Yuan
    Zhang, Jingwei
    Gong, Jie
    IEEE ACCESS, 2020, 8 : 54402 - 54414
  • [8] Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage
    Zhao, Yubo
    Chang, Jinyong
    COMPUTER NETWORKS, 2022, 216
  • [9] Designated-Verifier Provable Data Possession in Public Cloud Storage
    Ren, Yongjun
    Xu, Jiang
    Wang, Jin
    Kim, Jeong-Uk
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 11 - 19
  • [10] Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Lai, Yi-Chen
    IEEE ACCESS, 2017, 5 : 19333 - 19341