Abstract
In the smart city construction, massive data collected from various fields need to be outsourced to the cloud for convenience and resource saving. However, integrity and confidentiality of the data in cloud remains a challenge issue due to the loss of data possession. As a solution, some public data auditing schemes have been proposed in last several years. Most recently, Li et al. proposed an efficient public auditing scheme and claimed that it could reduce the cost of clients on generating verification metadata. In this paper, we analyze the security of Li et al.’s scheme and point out two weaknesses in it. We demonstrate that it cannot achieve the confidentiality for outsourced data and it is vulnerable to the proof forgery attack. To address these weaknesses, we propose an improved public auditing scheme, which can not only preserve the data privacy but also resist the proof forgery attack. Security analysis shows that our scheme is provably secure in a robust security model. Performance analysis shows that the proposed scheme can overcome the weaknesses in Li et al.’s scheme at the cost of increasing computation overhead slightly.
Similar content being viewed by others
References
Neirotti P, De Marco A, Cagliano A C, Mangano G, Scorrano F (2014) Current trends in smart city initiatives Somestylised facts. Cities 38:25–36
Li Y, Dai W, Ming Z, Qiu M (2016) Privacy protection for preventing data over-collection in smart city. IEEE Trans Comput 65(5):1339–1350
Yamamoto S, Matsumoto S, Nakamura M (2012) Using cloud technologies for large-scale house data in smart city 2012 IEEE 4th international conference on cloud computing technology and science (CloudCom). IEEE, pp 141–148
Dey S, Chakraborty A, Naskar S, Misra P (2012) Smart city surveillance: Leveraging benefits of cloud data stores 2012 IEEE 37th conference on local computer networks workshops (LCN Workshops). IEEE, pp 868–876
Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput
Song D, Shi E, Fischer I, Shankar U (2012) Cloud data protection for the masses. Computer
Behl A, Behl K (2012) An analysis of cloud computing security issues 2012 world congress on information and communication technologies (WICT). IEEE, pp 109–114
Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing 2012 data international conference on computer science and electronics engineering (ICCSEE), volume 1. IEEE, pp 647–651
Tate S R, Vishwanathan R, Everhart L (2013) Multi-user dynamic proofs of data possession using trusted hardware Proceedings of the 3rd ACM conference on data and application security and privacy. ACM, pp 353–364
Yuan J, Yu S (2013) Proofs of retrievability with public verifiability and constant communication cost in cloud Proceedings of the 2013 international workshop on security in cloud computing. ACM, pp 19–26
Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859
Shuang T, Lin T, Li X, Yan J (2014) An efficient method for checking the integrity of data in the cloud. Commun China 11(9):68–81
Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323
Fu Z, Sun X, Qi L, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE IEEE Trans Parallel Distrib Syst 27(2):340–352
Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559
Guo P, Wang J, Geng X, Chang S K, Kim J-U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–935
Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178
He D, Zeadally S, Kumar N, Lee J H (2016) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J. doi:10.1109/JSYST.2016.2544805
He D, Huang B, Chen J (2013) New certificateless short signature scheme. IET Inf Secur 7(7):113–117
Hwang J Y, Chen L, Cho H S, Nyang D H (2015) Short dynamic group signature scheme supporting controllable linkability. IEEE Trans Inf Forensics Secur 10(6):1109–1124
He D, Kumar N, Choo K-K R, Wu W (2016) Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Trans Inf Forensics Secur. doi:10.1109/TIFS.2016.2622682
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 598–609
Juels A, Kaliski Jr B S (2007) Pors: Proofs of retrievability for large files Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 584–597
Shacham H (2008) Compact proofs of retrievability. Trans ASIACRYPT (2008)
Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442–483
He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J. doi:10.1109/JSYST.2015.2428620
Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing Advances in cryptology—ASIACRYPT 2001. Springer, pp 514–532
Wang B, Li H, Li M (2013) Privacy-preserving public auditing for shared cloud data supporting group dynamics 2013 IEEE international conference on communications (ICC). IEEE, pp 1946–1950
Wang B, Li B, Li H, Li F (2013) Certificateless public auditing for data integrity in the cloud 2013 IEEE conference on communications and network security (CNS). IEEE, pp 136–144
Wang B, Li B, Li H (2015) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92–106
Yang T, Yu B, Wang H, Li J, Lv Z (2015) Cryptanalysis and improvement of panda-public auditing for shared data in cloud and internet of things. Multimedia Tools and Applications
Wang B, Chow S S M, Li M, Li H (2013) Storing shared data on the cloud via security-mediator 2013 IEEE 33rd international conference on distributed computing systems (ICDCS). IEEE, pp 124–133
Wang B, Li B, Li H (2013) Public auditing for shared data with efficient user revocation in the cloud IEEE INFOCOM. IEEE, pp 2904–2912
Li A, Tan S, Jia Y (2016) A method for achieving provable data integrity in cloud computing. J Supercomput
Yu Y, Xue L, Au M H, Susilo W, Ni J, Zhang Y, Vasilakos A V, Shen J (2016) Cloud data integrity checking with an identity-based auditing mechanism from rsa. Futur Gener Comput Syst 62:85–91
Tang C-M, Zhang X-J (2015) A new publicly verifiable data possession on remote storage. J Supercomput:1–15
Acknowledgments
We thank the anonymous reviewers for the constructive comments which help improve the quality and presentation of this paper. The work of L. Wu was supported by the National Natural Science Foundation of China (Nos.61272112, 61472287). The work of D. He was supported in part by the National Natural Science Foundation of China (Nos. 61572379, 61501333, U1536204), in part by the National High-Tech Research and Development Program of China (863 Program) (No. 2015AA016004), in part by the open fund of Guangxi Key Laboratory of Cryptography and Information Security, and in part by the Natural Science Foundation of Hubei Province of China (No. 2015CFB257).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wu, L., Wang, J., Kumar, N. et al. Secure public data auditing scheme for cloud storage in smart city. Pers Ubiquit Comput 21, 949–962 (2017). https://doi.org/10.1007/s00779-017-1048-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-017-1048-7