An Efficient Cloud Auditing Scheme for Data Integrity and Identity-Privacy of Multiple Uploaders

被引:0
|
作者
Al-Odat, Zeyad [1 ]
Khan, Samee [1 ]
机构
[1] North Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
基金
美国国家科学基金会;
关键词
Privacy; Cloud; Auditing; Security; SECURITY;
D O I
10.1109/CloudSummit47114.2019.00008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On the cloud, data are not only stored on multiple locations, but also shared across multiple users. The integrity of data on the cloud is subject to doubt due to cloud failures. Therefore, many techniques are available to verify the existence of data on the cloud without retrieving the entire file. However, the data auditing techniques reveal confidential information to the designated verifier which breach the identity of the data uploaders. This paper introduces a privacy-preserving scheme for multiple data uploaders over the cloud. In the proposed design, the identities of the data block signers are hidden from a Third Party Auditor (TPA). A Secure Hash Algorithm (SHA) is also employed to provide an integral auditing report between the data owner(s) and the TPA. The proposed design is tested and verified mathematically and experimentally using a set of synthesized data.
引用
收藏
页码:8 / 13
页数:6
相关论文
共 50 条
  • [1] Privacy-Preserving Cloud Auditing with Multiple Uploaders
    Wu, Ge
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016, 2016, 10060 : 224 - 237
  • [2] Threshold privacy-preserving cloud auditing with multiple uploaders
    Ge Wu
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Futai Zhang
    International Journal of Information Security, 2019, 18 : 321 - 331
  • [3] Threshold privacy-preserving cloud auditing with multiple uploaders
    Wu, Ge
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Zhang, Futai
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (03) : 321 - 331
  • [4] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [5] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    S. Anbuchelian
    C. M. Sowmya
    C. Ramesh
    Cluster Computing, 2019, 22 : 9767 - 9775
  • [6] Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving
    Yan, Hao
    Gui, Wenming
    IEEE ACCESS, 2021, 9 (09): : 45822 - 45831
  • [7] Practical Preserving Identity-Privacy Anonymous Data Sharing in Cloud Computing
    Zhang, Jianhong
    Zhen, Weina
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1629 - 1636
  • [8] Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
    Yuan, Yilin
    Gu, Yifan
    Zhang, Zhenzhen
    International Journal of Network Security, 2023, 25 (04) : 609 - 619
  • [9] Public Auditing Scheme for Cloud Data Integrity Verification
    Hiremath, Shivarajkumar
    Kunte, R. Sanjeev
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 237 - 246
  • [10] A decentralized data integrity auditing scheme for cloud storage
    Liu, Jiaxian
    Huang, Hui
    Chen, Qunshan
    Huang, Zhenjie
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 190 - 198