4.7 Article

NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users

期刊

IEEE TRANSACTIONS ON BIG DATA
卷 8, 期 1, 页码 14-24

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TBDATA.2017.2701347

关键词

Data integrity; homomorphic verifiable; non-frameability; provable security

资金

  1. National Science Foundation of China [61572255, 61572460]
  2. National Key R&D Program of China [2016YFB0800703]
  3. Natural Science Foundation of Jiangsu Province, China [BK20141404, BK20150787]
  4. Six talent peaks project of Jiangsu Province, China [XYDXXJS-032]
  5. Open Project Program of the State Key Laboratory of Information Security, China [2017-ZD-01]

向作者/读者索取更多资源

This paper proposes a new privacy-aware public auditing mechanism for shared cloud data by constructing a homomorphic verifiable group signature. It ensures the integrity and security of the data.
Today, cloud storage becomes one of the critical services, because users can easily modify and share data with others in cloud. However, the integrity of shared cloud data is vulnerable to inevitable hardware faults, software failures or human errors. To ensure the integrity of the shared data, some schemes have been designed to allow public verifiers (i.e., third party auditors) to efficiently audit data integrity without retrieving the entire users' data from cloud. Unfortunately, public auditing on the integrity of shared data may reveal data owners' sensitive information to the third party auditor. In this paper, we propose a new privacy-aware public auditing mechanism for shared cloud data by constructing a homomorphic verifiable group signature. Unlike the existing solutions, our scheme requires at least t group managers to recover a trace key cooperatively, which eliminates the abuse of single-authority power and provides non-frameability. Moreover, our scheme ensures that group users can trace data changes through designated binary tree; and can recover the latest correct data block when the current data block is damaged. In addition, the formal security analysis and experimental results indicate that our scheme is provably secure and efficient.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据