Abstract
Public auditing checks the integrity of outsourced data via random sampling and verifying sample data blocks. In practice, however, users do not pay attention to the entire data set but focus on the integrity of only the part of the data containing keywords of interest. Therefore, the keyword-based auditing paradigm is proposed; it depends entirely on the subjective choice or access habits, which makes it possible for malicious storage servers to analyze the auditing frequency, or reduce redundant backups. For government data, auditing frequency privacy leakage or corruption of any file could be catastrophic. In this paper, we propose a hidden frequency keyword-based auditing scheme for a smart government named HFKA, which is compatible with distributed storage architecture. HFKA leverages a Bloom filter, which adjusts the false positive rate to consider auditing files corresponding to specified keywords and auditing random files obtained via fuzzy matching. To obtain privacy-preserving fuzzy matching, HFKA constructs an index table embedded with update times to retrieve a wide range of files to be audited. This approach is secure against the replay attack and supports the index table update through structure iteration instead of recalculation. HFKA provides storage robustness, privacy protection of hidden frequencies, and data security. Additionally, HFKA can reduce audit computation overhead by 32.6% compared to the probabilistic public auditing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Hyperledger Fabric architecture is a scalable architectural design, an open interface style, and pluggable components. It first introduced authority management into the blockchain field, and its authority management function was completed by its independent Fabric certificate authority module. Hyperledger Fabric provides an important architectural reference for the design and implementation of distributed platforms.
- 2.
The Reed Solomon erase-code technique is chosen to redundantly segment F, and its security and efficiency have been widely proven.
- 3.
Time frequency inverse document frequency is a keyword extraction technology that sorts all words according to the frequency of each word in the document, which is used to extract the top-\(\mathcal {K}\) words as the keywords of a file in HFKA.
References
Mellouli, S., Luna, R., Luis, F.: Smart government, citizen participation and open data. Inf. Polity 19(1–2), 1–4 (2014)
Wu, J., Ping, L., Ge, X., Wang, Y., Fu, J.: Cloud storage as the infrastructure of cloud computing. In: International Conference on Intelligent Computing and Cognitive Informatics, pp. 380–383 (2010)
Yang, K., Jia, X.: Data storage auditing service in cloud computing: Challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)
Gao, X., Yu, J., Chang Y., Wang, H., Fan, J.: Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data. IEEE Trans. Dependable Secure Comput., 1 (2021). https://doi.org/10.1109/TDSC.2021.3106780
Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM, Alexandria, VI (2007)
Juels, A., Kaliski, B.: Proofs of retrievability for large files. Proc. Comput. Commun. Secur. Alexandria: AcMPress 584, 597 (2007)
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04444-1_22
Merkle, R.C.: Secrecy, Authentication, and Public Key Systems, 2nd edn. Stanford University, Stanford (1979)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 IEEE INFOCOM, pp. 1–9. IEEE, San Diego, CA (2010)
Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(6), 362–375 (2013)
Zhou, L., Fu, A., Yang, G., Wang, H., Zhang, Y.: Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics. IEEE Trans. Dependable Secur. Comput. 19(2), 1118–1132 (2022)
Zhang, X., Zhao, J., Xu, C., Li, H., Wang, H., Zhang, Y.: CIPPPA: Conditional identity privacy-preserving public auditing for cloud-Based WBANs against malicious auditors. IEEE Trans. Cloud Comput. 9(4), 1362–1375 (2021)
Rashmi, K V., Shah, N B., Kumar, P V.: Enabling node repair in any erasure code for distributed storage. In: 2011 IEEE International Symposium on Information Theory, pp. 1235–1239. IEEE, St. Petersburg (2011)
Perard, D., Lacan, J., Bachy, Y., Detchart, J.: Erasure code-based low storage blockchain node. In: Proceedings of 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1622–1627. IEEE, Halifax, Canada (2018)
Jin, H., Luo, R., He, Q., Wu, S., Zeng, Z., Xia, X.: Cost-effective data placement in edge storage systems with erasure code. IEEE Trans. Serv. Comput., 1 (2022). https://doi.org/10.1109/TSC.2022.3152849
Sun, Y., Liu, Q., Chen, X., Du, X.: An adaptive authenticated data structure with privacy-preserving for big data stream in cloud. IEEE Trans. Inf. Forensics Secur. 15(2020), 3295–3310 (2020)
Li, S., Zhang, Y., Xu, C., Chen, K.: Cryptoanalysis of an authenticated data structure scheme with public privacy-preserving auditing. IEEE Trans. Inf. Forensics Secur. 16, 2564–2565 (2021)
Xu, S., Cai, X., Zhao, Y., Ren, Z., Du, L., Wang, Q., Zhou, J.: zkrpChain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs. Futur. Gener. Comput. Syst. 128, 490–504 (2022)
Shen, W., Qin, J., Yu, J., Hao, R., Hu, J., Ma, J.: Data integrity auditing without private key storage for secure cloud storage. IEEE Trans. Cloud Comput. 9(4), 1408–1421 (2019)
Zheng, W., Lai, C.F., He, D., Kumar, N., Chen, B.: Secure storage auditing with efficient key updates for cognitive industrial IoT environment. IEEE Trans. Industr. Inf. 17(6), 4238–4247 (2020)
Ge, X., Yu, J., Hu, C.: Enabling effificient verififiable fuzzy keyword search over encrypted data in cloud computing. IEEE Access 6, 45725–45739 (2018)
Miao, Y., Tong, Q., Deng, R., Choo, K.K.R., Liu, X., Li, H.: Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage. IEEE Trans. Cloud Comput. 10, 835–848 (2020)
Bringer, J., Chabanne, H., Kindarji, B.: Error-tolerant searchable encryption. In: IEEE International Conference on Communications, pp. 1–6 (2009)
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–5. IEEE, Cape Town (2010)
Wang, Q., et al.: Searchable encryption over feature-rich data. IEEE Trans. Dependable Secure Comput. 15(3), 496–510 (2016)
Zhong, H., Li, Z., Cui, J., Sun, Y., Liu, L.: Efficient dynamic multi-keyword fuzzy search over encrypted cloud data. J. Netw. Comput. Appl. 149, 102469 (2020)
Liu, Q., Peng, Y., Pei, S., Wu, J., Peng, T., Wang, G.: Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search. IEEE Trans. Serv. Comput. 15, 1799 (2020)
Li, X., et al.: VRFMS: verifiable ranked fuzzy multi-keyword search over encrypted data. IEEE Trans. Serv. Comput., 1 (2022). https://doi.org/10.1109/TSC.2021.3140092
Sahu, I.K., Nene, M.J.: Identity-based integrity verification (IBIV) protocol for cloud data storage. In: 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), pp. 1–6. IEEE, Bhilai (2021)
Yoosuf, M.S., Anitha, R.: LDuAP: Lightweight dual auditing protocol to verify data integrity in cloud storage servers. J. Ambient. Intell. Humaniz. Comput. 13(8), 3787–3805 (2022)
Tong, Q., Miao, Y., Weng, J., Liu, X., Choo, K.K.R., Deng, R.: Verifiable fuzzy multi-keyword search over encrypted data with adaptive security. IEEE Trans. Knowl. Data Eng., 1 (2022). https://doi.org/10.1109/TKDE.2022.3152033
Gervais, A., Capkun, S., Karame, G.O., Gruber, D.: On the privacy provisions of bloom filters in lightweight bitcoin clients. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 326–335. ACM, New Orleans, Louisiana (2014)
Pagh, A., Pagh, R., Rao, S.: An optimal bloom filter replacement. In: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 823–829. SODA, Vancouver, BC (2005)
Kiss, S.Z., Hosszu, E., Tapolcai, J., Ronyai, L., Rottenstreich, O.: Bloom filter with a false positive free zone. IEEE Trans. Netw. Serv. Manage. 18(2), 2334–2349 (2021)
Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965–976. ACM, Raleigh, NC (2012)
Bellare, M., Impagliazzo, R.: A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion. IACR Cryptol. ePrint Arch. 1999, 24 (1999)
McCurley, K S.: The discrete logarithm problem. In: Proceedings of Symposium in Applied Mathematics, pp. 49–74 (1990)
Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999)
Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, pp. 1–4. Chicago (2016)
Qu, Y., Nosouhi, M.R., Cui, L., Yu, S.: Existing privacy protection solutions. In: Personalized Privacy Protection in Big Data. DA, pp. 5–13. Springer, Singapore (2021). https://doi.org/10.1007/978-981-16-3750-6_2
Acknowledgements
This work was supported in part by the Southwest Petroleum University “Set Sail” Project (Grant No.0202667680-2021QHZ017); in part by the National Natural Science Foundation of China (Grant No.61902327); in part by the China Postdoctoral Science Foundation (Grant No.2020M681316); in part by the Chengdu Key R & D project (Grant No.2021-YF05-00965-SN); and in part by the Southwest Petroleum University Graduate Teaching and Research Reform Project (Grant No.JY20ZD06).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xue, J., Luo, S., Shi, L., Zhang, X., Xu, C. (2022). Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government. In: Ahene, E., Li, F. (eds) Frontiers in Cyber Security. FCS 2022. Communications in Computer and Information Science, vol 1726. Springer, Singapore. https://doi.org/10.1007/978-981-19-8445-7_4
Download citation
DOI: https://doi.org/10.1007/978-981-19-8445-7_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8444-0
Online ISBN: 978-981-19-8445-7
eBook Packages: Computer ScienceComputer Science (R0)