Skip to main content
Log in

Public Auditing for Shared Data Utilizing Backups with User Revocation in the Cloud

  • Computer Science
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

With the advent of cloud storage, users can share their own data in the remote cloud as a group. To ensure the security of stored data and the normal operation of public auditing, once a user is revoked from the user group, the data files he signed should be resigned by other legal users in the group. In this paper, we propose a new re-signature scheme utilizing backup files to rebuild data which can resist the collusion between the cloud and revoked users, and we use Shamir Secret Sharing Scheme to encrypt data in the multi-managers system which can separate the authority of the group managers. Moreover, our scheme is more practical because we do not need managers to be online all the time. Performance evaluation shows that our mechanism can improve the efficiency of the process of data re-signature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Armbrus M, Fox A, Griffith R, et al. A view of cloud computing[J]. Communications of the ACM, 2010, 53(4): 50–58.

    Article  Google Scholar 

  2. Cachin C, Keidar I, Shraer A. Trusting the cloud[J]. ACM Sigact News, 2009, 40(2): 81–86.

    Article  Google Scholar 

  3. Ren K, Wang C, Wang Q. Security challenges for the public cloud[J]. IEEE Internet Computing, 2012, 16(1): 69–73.

    Article  Google Scholar 

  4. Zhu Y, Ahn G J, Hu H, et al. Dynamic audit services for outsourced storages in clouds[J]. IEEE Transactions on Services Computing, 2013, 6(2): 227–238.

    Article  Google Scholar 

  5. Cao N, Yu S, Yang Z, et al. LT codes-based secure and reliable cloud storage service[J]. Proceedings-IEEE INFOCOM, 2012, 131(5): 693–701.

    Google Scholar 

  6. Yuan J, Yu S. Proofs of retrievability with public verifiability and constant communication cost in cloud [C]//International Workshop on Security in Cloud Computing. New York: ACM, 2013: 19–26.

    Google Scholar 

  7. Wang H. Proxy provable data possession in public clouds[J]. IEEE Transactions on Services Computing, 2013, 6(4): 551–559.

    Article  Google Scholar 

  8. Wang B Y, Li B C, Li H. Oruta: Privacy-preserving public auditing for shared data in the cloud[J]. IEEE Transactions on Cloud Computing, 2014, 2(1): 43–56.

    Article  Google Scholar 

  9. Jiang T, Chen X F, Ma J F. Public integrity auditing for shared dynamic cloud data with group user revocation[J]. IEEE Transactions on Computers, 2016, 65(8): 2363–2373.

    Article  Google Scholar 

  10. Wang B Y, Li B C, Li H. Panda: Public auditing for shared data with efficient user revocation in the cloud[J]. IEEE Transactions on Services Computing, 2015, 8(1): 92–106.

    Article  Google Scholar 

  11. Wang B, Li B, Li H. Knox: Privacy-preserving auditing for shared data with large groups in the cloud[C]//International Conference on Applied Cryptography and Network Security. Berlin: Springer-Verlag, 2012: 507–525.

    Chapter  Google Scholar 

  12. Wang B Y, Li H, Li M. Privacy-preserving public auditing for shared cloud data supporting group dynamics[C]//IEEE International Conference on Communications. Piscataway: IEEE, 2013: 1946–1950.

    Google Scholar 

  13. Wang B Y, Chow S, Li M, et al. Storing shared data on the cloud via security-mediator[C]//IEEE, International Conference on Distributed Computing Systems. Piscataway: IEEE, 2013: 124–133.

    Google Scholar 

  14. Yuan J W, Yu S C. Efficient public integrity checking for cloud data sharing with multi-user modification[C]//INFOCOM, 2014 Proceedings IEEE. Piscataway: IEEE, 2014: 2121–2129.

    Google Scholar 

  15. Luo Y C, Xu M, Fu S J, et al. Efficient integrity auditing for shared data in the cloud with secure user revocation[C]//IEEE Trustcom/bigdatase/ispa. Piscataway: IEEE, 2015: 434–442.

    Chapter  Google Scholar 

  16. Jiang T, Chen X F, Ma J F. Public integrity auditing for shared dynamic cloud data with group user revocation[J]. IEEE Transactions on Computers, 2016, 65(8): 2363–2373.

    Article  Google Scholar 

  17. Alshaimaa A, Nagwa L. Mohamed F. Data storage security service in cloud computing: Challenges and solutions[J]. Multimedia Forensics and Security, 2017, 115: 25–57.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baocang Wang.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (61572390), the National Key Research and Development Program of China (2017YFB0802000), the National Natural Science Foundation of Ningbo City (201601HJ-B01382), and the Open Foundation of Key Laboratory of Cognitive Radio and Information Processing of Ministry of Education (Guilin University of Electronic Technology) (CRKL160202)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, H., Wang, B., Lu, K. et al. Public Auditing for Shared Data Utilizing Backups with User Revocation in the Cloud. Wuhan Univ. J. Nat. Sci. 23, 129–138 (2018). https://doi.org/10.1007/s11859-018-1303-4

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-018-1303-4

Key words

CLC number

Navigation