Abstract
We propose the first secure cloud storage system with public audit for dynamic group, which achieves identity privacy-preserving and privilege control among mobile users. We utilize multi-key ciphertext policy attribute-based key encapsulation mechanisms (MCP-AB-KEMs) to achieve privileges of operations on the cloud data and the anonymity among the mobile users, and we utilize proxy re-signatures to update tags efficiently. In addition, a third party auditor (TPA) helps to check data integrity without the knowledge of users’ identities. We also give a security model and present the security analysis within the model.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, USA, pp. 310–319 (2005)
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22–25, 2008, p. 9 (2008)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007, pp. 321–334 (2007)
Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, pp. 187–198 (2009)
Chen, F., Xiang, T., Yang, Y., Chow, S.S.: Secure cloud storage meets with secure network coding. In: Proceeding of INFOCOM 2014, pp. 673–681. IEEE (2014)
Deswarte, Y., Quisquater, J.-J., Saïdane, A.: Remote integrity checking. In: Jajodia, S., Strous, L. (eds.) IICIS 2003. IFIP, vol. 140, pp. 1–11. Springer, Heidelberg (2004)
Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 213–222. ACM (2009)
Filho, D.L.G., Barreto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150 (2006)
Juels, A., Kaliski Jr., B.S.: Pors: proofs of retrievability for large files. In: The 14th ACM Conference on Computer and Communications Security, 2007, pp. 584–597 (2007)
Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631–648. Springer, Heidelberg (2010)
Naor, M., Rothblum, G.N.: The complexity of online memory checking. In: IEEE 54th Annual Symposium on FOCS 2005, pp. 573–584 (2005)
Schwarz, T., Miller, E.L.: Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proceedings of the IEEE Int’l Conference on Distributed Computing Systems (ICDCS 2006) (2006)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)
Syverson, P.F.: A taxonomy of replay attacks. In: Proceedings of Seventh IEEE Computer Security Foundations Workshop - CSFW 1994, Franconia, New Hampshire, USA, June 14–16, 1994, pp. 187–191 (1994)
Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 507–525. Springer, Heidelberg (2012)
Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14–19, 2013, pp. 2904–2912 (2013)
Wang, B., Li, B., Li, H.: Oruta: Privacy-preserving public auditingfor shared data in the cloud. IEEE T. Cloud Computing 2(1), 43–56 (2014)
Wang, B., Li, H., Li, M.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, June 9–13, 2013, pp. 1946–1950 (2013)
Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE T. Services Computing 5(2), 220–232
Wu, Y., Wei, Z., Deng, R.H.: Attribute-based access to scalable media in cloud-assisted content sharing networks. IEEE Transactions on Multimedia 15(4), 778–788 (2013)
Xu, J., Chang, E.C.: Towards efficient proofs of retrievability. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 79–80. ACM (2012)
Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)
Yu, Y., Mu, Y., Ni, J., Deng, J., Huang, K.: Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage. In: Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.) NSS 2014. LNCS, vol. 8792, pp. 28–40. Springer, Heidelberg (2014)
Zhao, X., Zhang, F., Tian, H.: Dynamic asymmetric group key agreement for ad hoc networks. Ad Hoc Networks 9(5), 928–939 (2011)
Zhu, Y., Wang, H., Hu, Z., Ahn, G.J., Hu, H., Yau, S.S.: Efficient provable data possession for hybrid clouds. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 756–758. ACM (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ma, H., Zhang, R. (2015). Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science(), vol 9408. Springer, Cham. https://doi.org/10.1007/978-3-319-25645-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-25645-0_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25644-3
Online ISBN: 978-3-319-25645-0
eBook Packages: Computer ScienceComputer Science (R0)