Skip to main content
Log in

File changes with security proof stored in cloud service systems

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

This paper proposes a new scheme in cloud service applied to smart home systems based on the technology of the Internet of Things (IoT), and the key technologies include sensing technology and cloud computing ability. The IoT refers to the network of objects, devices, machines, and other physical systems with computing and communication capabilities. On the smart home paradigm, the data collected from sensors can be sensitive information and that security breaches can have devastating economic and social impact. This paper proposes a platform to prevent collusion between users and the cloud service provider (CSP). To protect the privacy of the checked data, the leakage of personnel information in the protocol for the proof must be considered. The proposed protocol can verify users who modify shared files, so that a cloud-storage practice is considered safe. In addition, the proposed method preserves data privacy and minimizes computational cost by applying the bilinearity property of bilinear pairings.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Chen EY, Pei Y, Chen S, Tian Y, Kotcher R, Tague P (2014) Oauth demystified for mobile application developers. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp. 892–903

  2. Chin E, Felt AP, Greenwood K, Wagner D (2011) Analyzing inter-application communication in Android. In: Proceedings of the 9th international conference on mobile systems, applications, and services, pp. 239–252

  3. Denning T, Kohno T, Levy HM (2013) Computer security and the modern home. Commun ACM 56(1):94–103

    Article  Google Scholar 

  4. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security, pp. 598–609

  5. Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proceedings of the 14th international conference theory and application of cryptology and information security: advances in cryptology, pp. 90–107

  6. Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of the 15th ACM conference on computer and communication security, pp. 213–222

  7. Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on security and privacy in communication netowrks, article 9, pp. 1–10

  8. Ateniese G, Kamara S, Katz J (2009) Proofs of storage from homomorphic identification protocols. In: Proceedings of the 15th international conference theory and application of cryptology and information security: advances in cryptology, pp. 319–333

  9. Ateniese G, Burns R, Curtmola R, Herring J, Khan O, Kissner L, Peterson Z, Song D (2011) Remote data checking using provable data possession. ACM Trans Inf Syst Secur 14(1):1–34

    Article  Google Scholar 

  10. Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859

    Article  Google Scholar 

  11. Yang K, Jia X (2012) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–1726

    Article  Google Scholar 

  12. Zhu Y, Wang S, Hu H, Ahn GJ, Ma D (2012) Secure collaborative integrity verification for hybrid cloud environment. Int J Coop Inf Syst 21(3):165–197

    Article  Google Scholar 

  13. Zhu Y, Hu H, Ahn GJ, Yu M (2012) Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231–2244

    Article  Google Scholar 

  14. Zhu Y, Ahn GJ, Hu H, Yau SS, An HG, CJ H (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6(2):227–238

    Article  Google Scholar 

  15. Sookhak M, Gani A, Khan MK, Buyya R (2017) Dynamic remote data auditing for securing big data storage in cloud computing. Inf Sci 380:101–116

    Article  Google Scholar 

  16. Yu J, Ren K, Wang C, Varadharajan V (2015) Enabling cloud storage auditing with key-exposure resistance. IEEE Trans Inf Forensics Secur 10(6):1167–1179

    Article  Google Scholar 

  17. Liu X, Deng RH, Choo KKR, Weng J (2016) An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans Inf Forensics Secur 11(11):2401–2414

    Article  Google Scholar 

  18. Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J Syst Software 113:130–139

    Article  Google Scholar 

  19. Wang B, Li B, Li H (2014) Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans Cloud Comput 2(1):43–56

    Article  Google Scholar 

  20. Yuan J, Yu S (2015) Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans Inform Forensics Secur 10(8):1717–1726

    Article  Google Scholar 

  21. Boneh D, Lynn B, Gentry C, Shacham H (2003) Aggregate and veriably encrypted signatures from bilinear maps. In: Proceedings of the 22nd international conference on theory and applications of cryptographic techniques, pp. 416–432

  22. Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319

    Article  MathSciNet  MATH  Google Scholar 

  23. Lynn B (2013) PBC library–the pairing-based cryptography library. http://crypto.stanford.edu/pbc/. Accessed 12 Sep. 2017

Download references

Funding

This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grant MOST 106-2221-E-015-001-.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiuh-Jeng Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, CY., Huang, CT., Wang, YP. et al. File changes with security proof stored in cloud service systems. Pers Ubiquit Comput 22, 45–53 (2018). https://doi.org/10.1007/s00779-017-1090-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-017-1090-5

Keywords

Navigation