4.7 Article

Public integrity verification for data sharing in cloud with asynchronous revocation

期刊

DIGITAL COMMUNICATIONS AND NETWORKS
卷 8, 期 1, 页码 33-43

出版社

KEAI PUBLISHING LTD
DOI: 10.1016/j.dcan.2021.02.002

关键词

Cloud storage; Integrity verification; Asynchronous revocation

资金

  1. National Key Research and Development Project [2020YFC1522602]
  2. National Natural Science Foundation of China [62072349, U1811263, 61572378]
  3. Technological Innovation Major Program of Hubei Province [2019AAA072]
  4. Tarim University President Fund Doctoral Foundation Research Project [19/1117596]
  5. Xinjiang Regional Innovation Guidance Project [2017DB004]
  6. Basic and Advanced Research Projects of CSTC [cstc2019jcyj-zdxm0102]
  7. Chongqing Science and Technology Innovation Leading Talent Support Program [CSTCCXLJRC201908]
  8. Science and Technology Research Program of Chongqing Municipal Education Commission [KJZD-K201900605]

向作者/读者索取更多资源

Cloud data sharing service is popular in enterprises as it allows a group of people to access and modify shared data. Recently, there is a trend of enterprises moving their IT service to the cloud for easier management and cost reduction. However, existing research on data integrity verification in the cloud has security and efficiency issues when revoked users are involved in the resigning process. Therefore, it is crucial to design a practical and efficient integrity verification scheme to address this problem.
Cloud data sharing service, which allows a group of people to access and modify the shared data, is one of the most popular and efficient working styles in enterprises. Recently, there is an uprising trend that enterprises tend to move their IT service from local to cloud to ease the management and reduce the cost. Under the new cloud environment, the cloud users require the data integrity verification to inspect the data service at the cloud side. Several recent studies have focused on this application scenario. In these studies, each user within a group is required to sign a data block created or modified by him. While a user is revoked, all the data previously signed by him should be resigned. In the existing research, the resigning process is dependent on the revoked user. However, cloud users are autonomous. They may exit the system at any time without notifying the system admin and even are revoked due to misbehaviors. As the developers in the cloud-based software development platform, they are voluntary and not strictly controlled by the system. Due to this feature, cloud users may not always follow the cloud service protocol. They may not participate in generating the resigning key and may even expose their secret keys after being revoked. If the signature is not resigned in time, the subsequent verification will be affected. And if the secret key is exposed, the shared data will be maliciously modified by the attacker who grasps the key. Therefore, forcing a revoked user to participate in the revocation process will lead to efficiency and security problems. As a result, designing a practical and efficient integrity verification scheme that supports this scenario is highly desirable. In this paper, we identify this challenging problem as the asynchronous revocation, in which the revocation operations (i.e., re-signing key generation and resigning process) and the user's revocation are asynchronous. All the revocation operations must be able to be performed without the participation of the revoked user. Even more ambitiously, the revocation process should not rely on any special entity, such as the data owner or a trusted agency. To address this problem, we propose a novel public data integrity verification mechanism in which the data blocks signed by the revoked user will be resigned by another valid user. From the perspectives of security and practicality, the revoked user does not participate in the resigning process and the re-signing key generation. Our scheme allows anyone in the cloud computing system to act as the verifier to publicly and efficiently verify the integrity of the shared data using Homomorphic Verifiable Tags (HVTs). Moreover, the proposed scheme resists the collusion attack between the cloud server and the malicious revoked users. The numerical analysis and experimental results further validate the high efficiency and scalability of the proposed scheme. The experimental results manifest that re-signing 10,000 data blocks only takes 3.815 s and a user can finish the verification in 300 ms with a 99% error detection probability.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据