Advertisement

Threshold privacy-preserving cloud auditing with multiple uploaders

  • Ge Wu
  • Yi MuEmail author
  • Willy Susilo
  • Fuchun Guo
  • Futai Zhang
Regular Contribution
  • 104 Downloads

Abstract

Data integrity is a critical security issue in cloud storage. The data integrity checking schemes by a third-party auditor (TPA) have attracted a lot of attention. Sharing data among multiple users (uploaders) is an attractive feature of cloud storage. Considering the scenario of multiple uploaders, privacy-preserving cloud auditing makes it possible for the TPA to publicly verify the data integrity while guarantees that it cannot learn the identity of the data uploader. In this paper, we propose a (tn)-threshold privacy-preserving auditing scheme. Every user could generate a tag piece of a message from the tag generation algorithm individually. To respond a challenge from the TPA, the server needs at least t tag pieces from different users among all n users. Our scheme does not resort to ring signature or group signature techniques. The tag of a message consists of only one element, which is independent of the number of the users within the group. Therefore, the efficiency of tag generation and auditing of our scheme is compatible with an efficient construction (Wu et al., in: International conference on information security practice and experience ISPEC 2016, Springer, New York, 2016). We use the pairing-based cryptography library (PBC library-0.5.14) to implement the scheme and compare both the computation and transmission cost of our scheme with some existing schemes.

Keywords

Cloud auditing Multiple uploaders Identity privacy Threshold cryptography 

Notes

Acknowledgements

The authors thank the anonymous reviewers for their invaluable feedback on this work. This research was supported by the National Natural Science Foundation of China (61672289, 61822202, 61872087, 61872089).

References

  1. 1.
    Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, pp. 598–609 (2007)Google Scholar
  2. 2.
    Boneh, D., Boyen, X., Goh, E.: Hierarchical identity based encryption with constant size ciphertext. In: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Advances in Cryptology-EUROCRYPT 2005, Aarhus, Denmark, pp. 440–456 (2005)Google Scholar
  3. 3.
    Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) Advances in Cryptology-CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, pp. 41–55. Springer, Berlin (2004)Google Scholar
  4. 4.
    Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Advances in Cryptology-CRYPTO’89, pp. 307–315. Springer, New York (1989)Google Scholar
  5. 5.
    Feng, Y., Mu, Y., Yang, G., Liu, J.K.: A new public remote integrity checking scheme with user privacy. In: Information Security and Privacy: 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, pp. 377–394 (2015)Google Scholar
  6. 6.
    Shacham, H., Waters, B.: Compact proofs of retrievability. In: 14th International Conference on the Theory and Application of Cryptology and Information Security, Advances in Cryptology-ASIACRYPT 2008, Melbourne, Australia, pp. 90–107 (2008)Google Scholar
  7. 7.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Shoup, V.: Lower bounds for discrete logarithms and related problems. In: International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology-EUROCRYPT’97, Konstanz, Germany, pp. 256–266 (1997)Google Scholar
  9. 9.
    Wang, B., Chow, S.S.M., Li, M., Li, H.: Storing shared data on the cloud via security-mediator. In: IEEE Conference on Distributed Computing Systems-ICDCS, vol. 2013, pp. 124–133 (2013)Google Scholar
  10. 10.
    Wang, B., Li, B., Li, H.: Knox: Privacy-preserving auditing for shared data with large groups in the cloud. In: Applied Cryptography and Network Security—10th International Conference, ACNS 2012, Singapore, pp. 507–525 (2012)Google Scholar
  11. 11.
    Wang, B., Li, B., Li, H.: Oruta: Privacy-preserving public auditing for shared data in the cloud. In: 2012 IEEE Fifth International Conference on Cloud Computing, Honolulu, HI, USA, pp. 295–302 (2012)Google Scholar
  12. 12.
    Wang, B., Li, H., Li, M.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, pp. 1946–1950 (2013)Google Scholar
  13. 13.
    Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)CrossRefGoogle Scholar
  14. 14.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2010, San Diego, CA, USA, pp. 525–533 (2010)Google Scholar
  15. 15.
    Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRefGoogle Scholar
  16. 16.
    Wu, G., Mu, Y., Susilo, W., Guo, F.: Privacy-preserving cloud auditing with multiple uploaders. In: International Conference on Information Security Practice and Experience-ISPEC, vol. 2016, pp. 224–237 (2016)Google Scholar
  17. 17.
    Yu, Y., Mu, Y., Ni, J., Deng, J., Huang, K.: Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage. In: Network and System Security—8th International Conference, NSS 2014, Xi’an, China, pp. 28–40 (2014)Google Scholar
  18. 18.
    Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, pp. 2121–2129 (2014)Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Institute of Cybersecurity and Cryptology, School of Computing and Information TechnologyUniversity of WollongongWollongongAustralia
  2. 2.Fujian Provincial Key Laboratory of Network Security and CryptographyFujian Normal UniversityFuzhouChina
  3. 3.School of Computer Science and TechnologyNanjing Normal UniversityNanjingChina

Personalised recommendations