Abstract
This paper proposes a new scheme in cloud service applied to smart home systems based on the technology of the Internet of Things (IoT), and the key technologies include sensing technology and cloud computing ability. The IoT refers to the network of objects, devices, machines, and other physical systems with computing and communication capabilities. On the smart home paradigm, the data collected from sensors can be sensitive information and that security breaches can have devastating economic and social impact. This paper proposes a platform to prevent collusion between users and the cloud service provider (CSP). To protect the privacy of the checked data, the leakage of personnel information in the protocol for the proof must be considered. The proposed protocol can verify users who modify shared files, so that a cloud-storage practice is considered safe. In addition, the proposed method preserves data privacy and minimizes computational cost by applying the bilinearity property of bilinear pairings.
Similar content being viewed by others
References
Chen EY, Pei Y, Chen S, Tian Y, Kotcher R, Tague P (2014) Oauth demystified for mobile application developers. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp. 892–903
Chin E, Felt AP, Greenwood K, Wagner D (2011) Analyzing inter-application communication in Android. In: Proceedings of the 9th international conference on mobile systems, applications, and services, pp. 239–252
Denning T, Kohno T, Levy HM (2013) Computer security and the modern home. Commun ACM 56(1):94–103
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security, pp. 598–609
Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proceedings of the 14th international conference theory and application of cryptology and information security: advances in cryptology, pp. 90–107
Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of the 15th ACM conference on computer and communication security, pp. 213–222
Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on security and privacy in communication netowrks, article 9, pp. 1–10
Ateniese G, Kamara S, Katz J (2009) Proofs of storage from homomorphic identification protocols. In: Proceedings of the 15th international conference theory and application of cryptology and information security: advances in cryptology, pp. 319–333
Ateniese G, Burns R, Curtmola R, Herring J, Khan O, Kissner L, Peterson Z, Song D (2011) Remote data checking using provable data possession. ACM Trans Inf Syst Secur 14(1):1–34
Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859
Yang K, Jia X (2012) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–1726
Zhu Y, Wang S, Hu H, Ahn GJ, Ma D (2012) Secure collaborative integrity verification for hybrid cloud environment. Int J Coop Inf Syst 21(3):165–197
Zhu Y, Hu H, Ahn GJ, Yu M (2012) Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231–2244
Zhu Y, Ahn GJ, Hu H, Yau SS, An HG, CJ H (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6(2):227–238
Sookhak M, Gani A, Khan MK, Buyya R (2017) Dynamic remote data auditing for securing big data storage in cloud computing. Inf Sci 380:101–116
Yu J, Ren K, Wang C, Varadharajan V (2015) Enabling cloud storage auditing with key-exposure resistance. IEEE Trans Inf Forensics Secur 10(6):1167–1179
Liu X, Deng RH, Choo KKR, Weng J (2016) An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans Inf Forensics Secur 11(11):2401–2414
Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J Syst Software 113:130–139
Wang B, Li B, Li H (2014) Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans Cloud Comput 2(1):43–56
Yuan J, Yu S (2015) Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans Inform Forensics Secur 10(8):1717–1726
Boneh D, Lynn B, Gentry C, Shacham H (2003) Aggregate and veriably encrypted signatures from bilinear maps. In: Proceedings of the 22nd international conference on theory and applications of cryptographic techniques, pp. 416–432
Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319
Lynn B (2013) PBC library–the pairing-based cryptography library. http://crypto.stanford.edu/pbc/. Accessed 12 Sep. 2017
Funding
This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grant MOST 106-2221-E-015-001-.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, CY., Huang, CT., Wang, YP. et al. File changes with security proof stored in cloud service systems. Pers Ubiquit Comput 22, 45–53 (2018). https://doi.org/10.1007/s00779-017-1090-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-017-1090-5