Skip to main content

Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control

  • Conference paper
  • First Online:
  • 1695 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9408))

Abstract

We propose the first secure cloud storage system with public audit for dynamic group, which achieves identity privacy-preserving and privilege control among mobile users. We utilize multi-key ciphertext policy attribute-based key encapsulation mechanisms (MCP-AB-KEMs) to achieve privileges of operations on the cloud data and the anonymity among the mobile users, and we utilize proxy re-signatures to update tags efficiently. In addition, a third party auditor (TPA) helps to check data integrity without the knowledge of users’ identities. We also give a security model and present the security analysis within the model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609 (2007)

    Google Scholar 

  2. Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, USA, pp. 310–319 (2005)

    Google Scholar 

  3. Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22–25, 2008, p. 9 (2008)

    Google Scholar 

  4. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007, pp. 321–334 (2007)

    Google Scholar 

  5. Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, pp. 187–198 (2009)

    Google Scholar 

  6. Chen, F., Xiang, T., Yang, Y., Chow, S.S.: Secure cloud storage meets with secure network coding. In: Proceeding of INFOCOM 2014, pp. 673–681. IEEE (2014)

    Google Scholar 

  7. Deswarte, Y., Quisquater, J.-J., Saïdane, A.: Remote integrity checking. In: Jajodia, S., Strous, L. (eds.) IICIS 2003. IFIP, vol. 140, pp. 1–11. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 213–222. ACM (2009)

    Google Scholar 

  9. Filho, D.L.G., Barreto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150 (2006)

    Google Scholar 

  10. Juels, A., Kaliski Jr., B.S.: Pors: proofs of retrievability for large files. In: The 14th ACM Conference on Computer and Communications Security, 2007, pp. 584–597 (2007)

    Google Scholar 

  11. Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631–648. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. Naor, M., Rothblum, G.N.: The complexity of online memory checking. In: IEEE 54th Annual Symposium on FOCS 2005, pp. 573–584 (2005)

    Google Scholar 

  13. Schwarz, T., Miller, E.L.: Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proceedings of the IEEE Int’l Conference on Distributed Computing Systems (ICDCS 2006) (2006)

    Google Scholar 

  14. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. Syverson, P.F.: A taxonomy of replay attacks. In: Proceedings of Seventh IEEE Computer Security Foundations Workshop - CSFW 1994, Franconia, New Hampshire, USA, June 14–16, 1994, pp. 187–191 (1994)

    Google Scholar 

  16. Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 507–525. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  17. Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14–19, 2013, pp. 2904–2912 (2013)

    Google Scholar 

  18. Wang, B., Li, B., Li, H.: Oruta: Privacy-preserving public auditingfor shared data in the cloud. IEEE T. Cloud Computing 2(1), 43–56 (2014)

    Article  Google Scholar 

  19. Wang, B., Li, H., Li, M.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, June 9–13, 2013, pp. 1946–1950 (2013)

    Google Scholar 

  20. Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE T. Services Computing 5(2), 220–232

    Google Scholar 

  21. Wu, Y., Wei, Z., Deng, R.H.: Attribute-based access to scalable media in cloud-assisted content sharing networks. IEEE Transactions on Multimedia 15(4), 778–788 (2013)

    Article  Google Scholar 

  22. Xu, J., Chang, E.C.: Towards efficient proofs of retrievability. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 79–80. ACM (2012)

    Google Scholar 

  23. Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)

    Article  Google Scholar 

  24. Yu, Y., Mu, Y., Ni, J., Deng, J., Huang, K.: Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage. In: Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.) NSS 2014. LNCS, vol. 8792, pp. 28–40. Springer, Heidelberg (2014)

    Google Scholar 

  25. Zhao, X., Zhang, F., Tian, H.: Dynamic asymmetric group key agreement for ad hoc networks. Ad Hoc Networks 9(5), 928–939 (2011)

    Article  Google Scholar 

  26. Zhu, Y., Wang, H., Hu, Z., Ahn, G.J., Hu, H., Yau, S.S.: Efficient provable data possession for hybrid clouds. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 756–758. ACM (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rui Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ma, H., Zhang, R. (2015). Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science(), vol 9408. Springer, Cham. https://doi.org/10.1007/978-3-319-25645-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25645-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25644-3

  • Online ISBN: 978-3-319-25645-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics