REN Zhengwei, WANG Lina, WU Qianhong, DENG Ruyi. Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage[J]. Chinese Journal of Electronics, 2014, 23(2): 297-301.
Citation: REN Zhengwei, WANG Lina, WU Qianhong, DENG Ruyi. Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage[J]. Chinese Journal of Electronics, 2014, 23(2): 297-301.

Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage

Funds:  This work is supported by the Doctoral Fund of the Ministry of Education priority areas of development projects (No.20110141130006).
  • Received Date: 2013-01-01
  • Rev Recd Date: 2013-06-01
  • Publish Date: 2014-04-05
  • Many schemes have been present to tackle data integrity and retrievability in cloud storage. Few of existing schemes support data dynamics, public verification and protect data privacy simultaneously. We propose a public auditing scheme which enables privacy-preserving, data dynamics and batch auditing. A data updating information table is designed to record the status information of the data blocks and facilitate data dynamics. Homomorphic authenticator and random masking technologies are exploited to protect data privacy for data owners. The scheme employs a Trusted third party auditor (TTPA) to verify the data integrity without learning any information about the data content during the auditing process. The scheme also allows batch auditing so that TTPA can process multiple auditing requests simultaneously which greatly accelerates the auditing process. Security and performance analysis show that our scheme is secure and feasible.
  • loading
  • P. Mell, T. Grance, "Draft nist working definition of cloud computing", Available:http://csrc.nist.gov/groups/SNS/cloudcomlinebreak puting/index.html, 2009.
    L.N. Wang, Z.W. Ren, Y.W. Yu, et al, "A data assured deletion approach adapted for cloud storage", Acta Electronica Sinica, Vol.40, No.2, pp.266-272, 2012. (in Chinese)
    M. Armbrust, A. Fox, R. Griffith, et al, "Above the clouds: A berkeley view of cloud computing", University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, 2009.
    Amazon.com, Amazon s3 availability event: July 20, 2008, Available: http://status.aws.amazon.com/s3-20080720.html, 2008.
    B. Krebs, Payment processor breach may be largest ever, Available: http://voices.washingtonpost.com/securityfix/2009/ 01/payment_processor_breach_may_b.html, 2009.
    G. Ateniese, R. Burns, R. Curtmola, et al, "Provable data possession at untrusted stores", Proceedings of CCS'07, Alexandria, USA, pp.598-609, 2007.
    Q.Wang, C.Wang, J.Li, et al, "Enabling public verifiability and data dynamic for storage security in cloud computing", Proceedings of ESORICS'09, Saint Malo, France, pp.355-370, 2009.
    A. Juels, B.S. Kaliski, "PORs: Proofs of retrievability for large files" Proceedings of CCS'07, Alexandria, USA, pp.584-597, 2007.
    H. Shacham, B. Water, "Compact proofs of retrievability", Proceeding of Asiacrypt'08, Melbourne, Australia, pp.90-107, 2008.
    C. Wang, Q. Wang, K. Ren, et al, "privacy-preserving public auditing for data storage security in cloud computing", Proceedings of INFOCOM'10, San Diego, USA, pp.1-9, 2010.
    Y. Zhu, H. Wang, Z. Hu, et al, "Cooperative provable data possession", Technical Report, Cryptology ePrint Archive: Report 2010/234, http://eprint.iacr.org/2010/234, 2010.
    Q. Zheng, S. Xu, "Fair and dynamic proofs of retrievability", Proceedings of CODASPY11, San Antonio, USA, pp.237-248, 2011.
    D. Boneh, B. Lynn, H. Shacham, "Short signatures from the weil pairing", Journal of Cryptology, Vol.17, No.4, pp.297-319, 2004.
    D. Boneh, C. Gentry, "Aggregate and verifiable encrypted signatures from bilinear maps", Proceedings of Eurocrypt'03, Warsaw, Poland, pp.416-432, 2003.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (336) PDF downloads(1504) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return