4.7 Article

NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users

Journal

IEEE TRANSACTIONS ON BIG DATA
Volume 8, Issue 1, Pages 14-24

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TBDATA.2017.2701347

Keywords

Data integrity; homomorphic verifiable; non-frameability; provable security

Funding

  1. National Science Foundation of China [61572255, 61572460]
  2. National Key R&D Program of China [2016YFB0800703]
  3. Natural Science Foundation of Jiangsu Province, China [BK20141404, BK20150787]
  4. Six talent peaks project of Jiangsu Province, China [XYDXXJS-032]
  5. Open Project Program of the State Key Laboratory of Information Security, China [2017-ZD-01]

Ask authors/readers for more resources

This paper proposes a new privacy-aware public auditing mechanism for shared cloud data by constructing a homomorphic verifiable group signature. It ensures the integrity and security of the data.
Today, cloud storage becomes one of the critical services, because users can easily modify and share data with others in cloud. However, the integrity of shared cloud data is vulnerable to inevitable hardware faults, software failures or human errors. To ensure the integrity of the shared data, some schemes have been designed to allow public verifiers (i.e., third party auditors) to efficiently audit data integrity without retrieving the entire users' data from cloud. Unfortunately, public auditing on the integrity of shared data may reveal data owners' sensitive information to the third party auditor. In this paper, we propose a new privacy-aware public auditing mechanism for shared cloud data by constructing a homomorphic verifiable group signature. Unlike the existing solutions, our scheme requires at least t group managers to recover a trace key cooperatively, which eliminates the abuse of single-authority power and provides non-frameability. Moreover, our scheme ensures that group users can trace data changes through designated binary tree; and can recover the latest correct data block when the current data block is damaged. In addition, the formal security analysis and experimental results indicate that our scheme is provably secure and efficient.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available