4.6 Article

Redactable Signature-Based Public Auditing Scheme With Sensitive Data Sharing for Cloud Storage

期刊

IEEE SYSTEMS JOURNAL
卷 16, 期 3, 页码 3613-3624

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2022.3159832

关键词

Cloud computing; Servers; Data privacy; Cryptography; Privacy; Data integrity; Task analysis; Cloud storage; data sharing; privacy preserving; public auditing

资金

  1. National Natural Science Foundation of China [61972190]
  2. Natural Science Foundation of Jiangsu Province [BK20200839]

向作者/读者索取更多资源

To ensure the integrity of data stored in a cloud server, data owners need to use public auditing techniques. However, if data is modified dynamically during the data anonymization process, the auditing result becomes invalid. Therefore, we propose a new scheme based on redactable signatures, which allows direct transformation of signatures when sharing sensitive data, without the need for additional data sanitizers.
To guarantee data security, the data owner needs to check the integrity of data stored remotely in the cloud server with the public auditing technique. However, the auditing result will be invalid if the data have been modified dynamically in the process of data anonymization when sharing data to others with sensitive information. In existing solutions, a data sanitizer is needed to anonymize the data and transform the signature. However, such data sanitizers introduce new security risks, and the static anonymous strategy is not flexible to different application scenarios. Therefore, we propose a new scheme based on redactable signature. In our proposed scheme, the cloud server can transform the signature directly without the additional sanitizer while sharing sensitive data. The signature transformation does not influence the integrity checking of the stored data. The signature not only can be used to authenticate the source of sharing data, but can also be used to check the integrity of the stored data in the cloud. Both the security proof and experimental analysis show that our proposed scheme is secure and more efficient than the existing schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据