Abstract
With the development of cloud data storage, more and more data owners are choosing to store their data in the Cloud and share them as a group. To protect integrity of sharing data, data are signed before they are stored on the cloud. When a user is revoked from the group, the revoked user’s signature can be converted to the existing group member’s signature by the cloud to preserve the revocation’s efficiency. Accordingly, the public auditing should be done by the third party auditor using the existing group member’s public key. As a basic secure requirement, the cloud sever should not know the existing group member’s private key even if he obtains the revoked user’s private key. In this paper, we propose a new public auditing protocol in which a public verifier is always able to audit the integrity of shared data even if some part of shared data has been re-signed by the cloud. By integrating the proxy re-signature with random masking technique, the new public auditing protocol satisfies the basic secure requirement. In addition, we prove the security of the new protocol, and finally compare it with other existing public auditing protocols and show that the new mechanism provides a good key-exposure protection for the existed public auditing protocol for shared data without losing the communication and computation efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ateniese, G., Burns, R., Curtmola, R. et al.: Provable data possession at untrusted stores. In: The Proceedings of ACM CCS 2007, pp. 598–610 (2007)
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: The Proceedings of ICST SecureComm 2008 (2008)
Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: The Proceedings of ACM CCS 2009, pp. 213–222 (2009)
Juels, A., Burton, J., Kaliski, S.: Proofs of retrievability for large files. In: The Proceedings of ACM CCS 2007, pp. 584–597 (2007)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)
Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5(2), 220–232 (2012)
Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Transa. Comput. 62(2), 275–362 (2013)
Zhu, Y., Wang, H., Hu, Z. et al.: Dynamic audit services for integrity verification of outsourced storage in clouds. In: The Proceedings of ACM SAC 2011, pp. 1550–1557 (2011)
Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. In: The Proceedings of IEEE Cloud 2012, pp. 95–302 (2012)
Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 507–525. Springer, Heidelberg (2012)
Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. In: The Proceedings of INFOCOM 2013, pp. 2904–2912 (2013)
Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms and applications. In: The Proceedings of ACM CCS 2005, pp. 310–319 (2005)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Acknowledgements
This work was supported by the National Natural Science Foundation of China (grant number 61300172), the Research Fund for the Doctoral Program of Higher Education (grant number 20121102120017) and the Fund of the State Key Laboratory of Software Development Environment (grant number SKLSDE-2014ZX-14), and the Fundamental Research Funds for the Central Universities grant number YWF-14-JSJXY-008).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Guo, H., Ma, F., Li, Z., Xia, C. (2015). Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage. In: Yung, M., Zhu, L., Yang, Y. (eds) Trusted Systems. INTRUST 2014. Lecture Notes in Computer Science(), vol 9473. Springer, Cham. https://doi.org/10.1007/978-3-319-27998-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-27998-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27997-8
Online ISBN: 978-3-319-27998-5
eBook Packages: Computer ScienceComputer Science (R0)