Skip to main content
Log in

Efficient privacy-preserving third-party auditing for ambient intelligence systems

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Due to limited resources of actors, third-party auditing has vital significance for ambient intelligence systems, which ensures the integrity of data stored in the information manager. However, Current public key based third-party auditing schemes are costly, while simple MAC based third-party auditing schemes can’t fulfill two security requirements, namely the privacy-preserving and the integrity-against-TPA requirements. Taking both security and efficiency into account, this paper proposes a novel simple MAC based third-party auditing scheme, which is much more efficient than current public key based schemes, while still fulfills the above two security requirements. Therefore, it is feasible to be deployed in ambient intelligence systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Amazon.com (2008) Amazon s3 availability event. http://status.aws.amazon.com/s3-20080720.html

  • Arrington M (2006a) Email disaster: reports of mass email deletions. http://www.techcrunch.com/2006/12/28/gmail-disaster-reports-of-massemail-deletions

  • Arrington M (2006b) Apple’s MobileMe Experiences Post-Launch Pain. http://blogs.zdnet.com/projectfailures/?p=908

  • Ateniese G et al (2007a) Provable data possession at untrusted stores. In: Proc. ACM CCS 2007, CCS ’07, pp 598–609. ACM

  • Ateniese G et al (2007b) Provable data possession at untrusted stores. In: Proceedings of the ACM CCS2007, CCS ’07, pp 598–609. ACM

  • Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In Proc. first ACM conf. computer and comm. security (CCS-1993), CCS ’93. ACM

  • Doctor F, Iqbal R, Naguib RNG (2014) A fuzzy ambient intelligent agents approach for monitoring disease progression of dementia patients. J Ambient Intell Hum Comput 5:147–158

    Article  Google Scholar 

  • Juels A, Burton J, Kaliski S (2007) Pors: proofs of retrievability for large files. In: Proceedings of the ACM CCS2007, CCS ’07, pp 584–597. ACM

  • Lynn B, Boneh D, Shacham H (2001) Short signatures from the weil pairing. In Proc. seventh Int conf. theory and application of cryptology and information security: advances in cryptology, Asia-Crypt ’01, pp 514–532. LNCS

  • Lynn B (2006) PBC Library Manual 0.5.11. http://crypto.stanford.edu/pbc/manual/

  • Openssl.org (2013) Openssl-1.0.1e.tar.gz. http://www.openssl.org/source/

  • Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proceedings of the Asia-Crypt2008, Asia-Crypt ’08, pp 891–907. LNCS

  • Shah MA et al (2007a) Auditing to keep online storage services honest. In Proceedings of the USENIX HotOS, USENIX HotOS ’07. LNCS

  • Shah MA et al (2007b) Auditing to keep online storage services honest. In: Proc. USENIX HotOS 2007, USENIX HotOS ’07. LNCS

  • Tapia DI, Abraham A, Corchado JM, Alonso RS (2010) Agents and ambient intelligence: case studies. J Ambient Intell Hum Comput 1:85–93

    Article  Google Scholar 

  • Wang C et al (2010a) Privacy-preserving public auditing for storage security in cloud computing. In: Proc. IEEE INFOCOM 2010, INFOCOM ’10. IEEE

  • Wang C et al (2010b) Toward publicly auditable secure cloud data storage services. IEEE Netw 7:7

    Google Scholar 

  • Wang C et al (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62:362–375

    Article  MathSciNet  Google Scholar 

  • Wan C et al (2014) A xor based public auditing scheme for proof of storage. In: Proc. BWCCA 2014, BWCCA ’14. IEEE

  • Wang Q et al (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proc. ESORICS 2009, ESORICS ’09, pp 355–370. ACM

  • Wang Q et al (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 5:14

    Google Scholar 

  • Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 9:1717–1726

    Article  Google Scholar 

  • Yan Z et al (2011) Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proc. ACM symp. applied computing 2011, ASAC ’11, pp 1550–1557. ACM

Download references

Acknowledgments

This paper is supported by the NSFC (No. 61101088), the Chinese 863 plan (No. 2013AA014001), and the Opening Project of Key Lab of Information Network Security of Ministry of Public Security (No. C13607).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changsheng Wan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wan, C., Zhang, J., Pei, B. et al. Efficient privacy-preserving third-party auditing for ambient intelligence systems. J Ambient Intell Human Comput 7, 21–27 (2016). https://doi.org/10.1007/s12652-015-0295-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-015-0295-6

Keywords

Navigation