Abstract
Cloud platforms can provide elastic infrastructure for mobile users. Therefore, publicly auditing the integrity of shared data outsourced on the cloud is very important since the cloud may be untrusted. However, existing remote integrity checking protocols can not preserve owner’s privacy nor provide efficient user revocation. In this paper, we analyze a previous work, and improve the protocol to get better user revocation efficiency and preserve the users’ privacy against the untrusted cloud platform and the auditor.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. Internet Comput. 16(1), 69–73 (2012)
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. Infocom 2013, 2904–2912 (2013)
Ateniese, G., Hohenberger, S.: Proxy re-signature: new definitions, algorithm and applications. In: Proceedings of ACM CCS, pp. 310–319 (2005)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: CCS 2007: ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
Deswarte, Y., Quisquater, J.J., Saidane, A.: Remote integrity checking. In: Proceedings of the 6th Working Conference on Integrity and Internal Control in Information Systems, pp. 1–11, Lausanne, Switzerland (2003)
Erway, C., Kupcu. A, Papamanthou, C. et al.: Dynamic provable data possession. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 213–222, Chicago, USA (2009)
Sebe, F., Domingo, J., Martinez, A., Deswarte, Y., Quisquater, J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)
Hao, Z., Zhong, Z., Yu, N.: A privacypreserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432–1437 (2011)
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings of ACM/IEEE IWQoS 2009, pp. 1–9 (2009)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of InfoCom 2010. IEEE, March 2010
Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Wang, Q., Wang, C., Li, J., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parall. Distrib. Syst. 22(5), 847–859 (2011)
Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 507–525. Springer, Heidelberg (2012)
Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storage in clouds. In: Proceedings of ACM SAC 2011, pp. 1550–1557 (2011)
Chen, L.: Using algebraic signatures to check data possession in cloud storage. Future Gener. Comput. Syst. 29(7), 1709–1715 (2013)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Chen, F., Zhou, H., Luo, Y., Chen, Y. (2015). Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)