4.7 Article

Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TETC.2017.2759329

关键词

Protocols; Cloud computing; Cryptography; Servers; Data models; Concrete; Cloud storage; data integrity; attribute-based cryptography; threshold secret sharing

资金

  1. National Key R&D Program of China [2017YFB0802000]
  2. National Natural Science Foundation of China [61772326, 61572303]
  3. NSFC Research Fund for International Young Scientists [61750110528]
  4. National Cryptography Development Fund [MMJJ20170216]
  5. Foundation of State Key Laboratory of Information Security [2017-MS-03]
  6. Fundamental Research Funds for the Central Universities [GK201702004]

向作者/读者索取更多资源

Outsourced storage such as cloud storage can significantly reduce the burden of data management of data owners. Despite of a long list of merits of cloud storage, it triggers many security risks at the same time. Data integrity, one of the most burning challenges in secure cloud storage, is a fundamental and pivotal element in outsourcing services. Outsourced data auditing protocols enable a verifier to efficiently check the integrity of the outsourced files without downloading the entire file from the cloud, which can dramatically reduce the communication overhead between the cloud server and the verifier. Existing protocols are mostly based on public key infrastructure or an exact identity, which lacks flexibility of key management. In this paper, we seek to address the complex key management challenge in cloud data integrity checking by introducing attribute-based cloud data auditing, where users can upload files to cloud through some customized attribute set and specify some designated auditor set to check the integrity of the outsourced data. We formalize the system model and the security model for this new primitive, and describe a concrete construction of attribute-based cloud data integrity auditing protocol. The new protocol offers desirable properties namely attribute privacy-preserving and collusion-resistance. We prove soundness of our protocol based on the computational Diffie-Hellman assumption and the discrete logarithm assumption. Finally, we develop a prototype of the protocol which demonstrates the practicality of the protocol.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据