Abstract
With the advent of cloud storage, users can share their own data in the remote cloud as a group. To ensure the security of stored data and the normal operation of public auditing, once a user is revoked from the user group, the data files he signed should be resigned by other legal users in the group. In this paper, we propose a new re-signature scheme utilizing backup files to rebuild data which can resist the collusion between the cloud and revoked users, and we use Shamir Secret Sharing Scheme to encrypt data in the multi-managers system which can separate the authority of the group managers. Moreover, our scheme is more practical because we do not need managers to be online all the time. Performance evaluation shows that our mechanism can improve the efficiency of the process of data re-signature.
Similar content being viewed by others
References
Armbrus M, Fox A, Griffith R, et al. A view of cloud computing[J]. Communications of the ACM, 2010, 53(4): 50–58.
Cachin C, Keidar I, Shraer A. Trusting the cloud[J]. ACM Sigact News, 2009, 40(2): 81–86.
Ren K, Wang C, Wang Q. Security challenges for the public cloud[J]. IEEE Internet Computing, 2012, 16(1): 69–73.
Zhu Y, Ahn G J, Hu H, et al. Dynamic audit services for outsourced storages in clouds[J]. IEEE Transactions on Services Computing, 2013, 6(2): 227–238.
Cao N, Yu S, Yang Z, et al. LT codes-based secure and reliable cloud storage service[J]. Proceedings-IEEE INFOCOM, 2012, 131(5): 693–701.
Yuan J, Yu S. Proofs of retrievability with public verifiability and constant communication cost in cloud [C]//International Workshop on Security in Cloud Computing. New York: ACM, 2013: 19–26.
Wang H. Proxy provable data possession in public clouds[J]. IEEE Transactions on Services Computing, 2013, 6(4): 551–559.
Wang B Y, Li B C, Li H. Oruta: Privacy-preserving public auditing for shared data in the cloud[J]. IEEE Transactions on Cloud Computing, 2014, 2(1): 43–56.
Jiang T, Chen X F, Ma J F. Public integrity auditing for shared dynamic cloud data with group user revocation[J]. IEEE Transactions on Computers, 2016, 65(8): 2363–2373.
Wang B Y, Li B C, Li H. Panda: Public auditing for shared data with efficient user revocation in the cloud[J]. IEEE Transactions on Services Computing, 2015, 8(1): 92–106.
Wang B, Li B, Li H. Knox: Privacy-preserving auditing for shared data with large groups in the cloud[C]//International Conference on Applied Cryptography and Network Security. Berlin: Springer-Verlag, 2012: 507–525.
Wang B Y, Li H, Li M. Privacy-preserving public auditing for shared cloud data supporting group dynamics[C]//IEEE International Conference on Communications. Piscataway: IEEE, 2013: 1946–1950.
Wang B Y, Chow S, Li M, et al. Storing shared data on the cloud via security-mediator[C]//IEEE, International Conference on Distributed Computing Systems. Piscataway: IEEE, 2013: 124–133.
Yuan J W, Yu S C. Efficient public integrity checking for cloud data sharing with multi-user modification[C]//INFOCOM, 2014 Proceedings IEEE. Piscataway: IEEE, 2014: 2121–2129.
Luo Y C, Xu M, Fu S J, et al. Efficient integrity auditing for shared data in the cloud with secure user revocation[C]//IEEE Trustcom/bigdatase/ispa. Piscataway: IEEE, 2015: 434–442.
Jiang T, Chen X F, Ma J F. Public integrity auditing for shared dynamic cloud data with group user revocation[J]. IEEE Transactions on Computers, 2016, 65(8): 2363–2373.
Alshaimaa A, Nagwa L. Mohamed F. Data storage security service in cloud computing: Challenges and solutions[J]. Multimedia Forensics and Security, 2017, 115: 25–57.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (61572390), the National Key Research and Development Program of China (2017YFB0802000), the National Natural Science Foundation of Ningbo City (201601HJ-B01382), and the Open Foundation of Key Laboratory of Cognitive Radio and Information Processing of Ministry of Education (Guilin University of Electronic Technology) (CRKL160202)
Rights and permissions
About this article
Cite this article
Liu, H., Wang, B., Lu, K. et al. Public Auditing for Shared Data Utilizing Backups with User Revocation in the Cloud. Wuhan Univ. J. Nat. Sci. 23, 129–138 (2018). https://doi.org/10.1007/s11859-018-1303-4
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-018-1303-4