Skip to main content
Log in

Threshold privacy-preserving cloud auditing with multiple uploaders

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Data integrity is a critical security issue in cloud storage. The data integrity checking schemes by a third-party auditor (TPA) have attracted a lot of attention. Sharing data among multiple users (uploaders) is an attractive feature of cloud storage. Considering the scenario of multiple uploaders, privacy-preserving cloud auditing makes it possible for the TPA to publicly verify the data integrity while guarantees that it cannot learn the identity of the data uploader. In this paper, we propose a (tn)-threshold privacy-preserving auditing scheme. Every user could generate a tag piece of a message from the tag generation algorithm individually. To respond a challenge from the TPA, the server needs at least t tag pieces from different users among all n users. Our scheme does not resort to ring signature or group signature techniques. The tag of a message consists of only one element, which is independent of the number of the users within the group. Therefore, the efficiency of tag generation and auditing of our scheme is compatible with an efficient construction (Wu et al., in: International conference on information security practice and experience ISPEC 2016, Springer, New York, 2016). We use the pairing-based cryptography library (PBC library-0.5.14) to implement the scheme and compare both the computation and transmission cost of our scheme with some existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. This step is to guarantee that the elements in \(pk_\Delta \) are computed from valid shares of w. In practice, an alternative way is to apply a verifiable secret sharing scheme to divide w and compute \(pk_\Delta \).

References

  1. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, pp. 598–609 (2007)

  2. Boneh, D., Boyen, X., Goh, E.: Hierarchical identity based encryption with constant size ciphertext. In: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Advances in Cryptology-EUROCRYPT 2005, Aarhus, Denmark, pp. 440–456 (2005)

  3. Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) Advances in Cryptology-CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, pp. 41–55. Springer, Berlin (2004)

  4. Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Advances in Cryptology-CRYPTO’89, pp. 307–315. Springer, New York (1989)

  5. Feng, Y., Mu, Y., Yang, G., Liu, J.K.: A new public remote integrity checking scheme with user privacy. In: Information Security and Privacy: 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, pp. 377–394 (2015)

  6. Shacham, H., Waters, B.: Compact proofs of retrievability. In: 14th International Conference on the Theory and Application of Cryptology and Information Security, Advances in Cryptology-ASIACRYPT 2008, Melbourne, Australia, pp. 90–107 (2008)

  7. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  8. Shoup, V.: Lower bounds for discrete logarithms and related problems. In: International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology-EUROCRYPT’97, Konstanz, Germany, pp. 256–266 (1997)

  9. Wang, B., Chow, S.S.M., Li, M., Li, H.: Storing shared data on the cloud via security-mediator. In: IEEE Conference on Distributed Computing Systems-ICDCS, vol. 2013, pp. 124–133 (2013)

  10. Wang, B., Li, B., Li, H.: Knox: Privacy-preserving auditing for shared data with large groups in the cloud. In: Applied Cryptography and Network Security—10th International Conference, ACNS 2012, Singapore, pp. 507–525 (2012)

  11. Wang, B., Li, B., Li, H.: Oruta: Privacy-preserving public auditing for shared data in the cloud. In: 2012 IEEE Fifth International Conference on Cloud Computing, Honolulu, HI, USA, pp. 295–302 (2012)

  12. Wang, B., Li, H., Li, M.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, pp. 1946–1950 (2013)

  13. Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)

    Article  Google Scholar 

  14. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2010, San Diego, CA, USA, pp. 525–533 (2010)

  15. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)

    Article  Google Scholar 

  16. Wu, G., Mu, Y., Susilo, W., Guo, F.: Privacy-preserving cloud auditing with multiple uploaders. In: International Conference on Information Security Practice and Experience-ISPEC, vol. 2016, pp. 224–237 (2016)

  17. Yu, Y., Mu, Y., Ni, J., Deng, J., Huang, K.: Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage. In: Network and System Security—8th International Conference, NSS 2014, Xi’an, China, pp. 28–40 (2014)

  18. Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, pp. 2121–2129 (2014)

Download references

Acknowledgements

The authors thank the anonymous reviewers for their invaluable feedback on this work. This research was supported by the National Natural Science Foundation of China (61672289, 61822202, 61872087, 61872089).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi Mu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, G., Mu, Y., Susilo, W. et al. Threshold privacy-preserving cloud auditing with multiple uploaders. Int. J. Inf. Secur. 18, 321–331 (2019). https://doi.org/10.1007/s10207-018-0420-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-018-0420-6

Keywords

Navigation