skip to main content
10.1145/3331453.3361648acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

An Efficient and Secure Scheme for Dynamic Shared Data in Cloud

Published: 22 October 2019 Publication History

Abstract

People have proposed many data integrity techniques to secure data storage in cloud. The majority of these schemes assume that only the owner of the data can modify their storage in cloud. In recent years, researchers have allowed different cloud users to use integrity assurance for modifying data. As a result, schemes with stronger reality than before have been proposed. Nevertheless, these attempts are impractical due to the large computing costs for cloud users. Clients must also perform numerous computations to ensure the integrity of data storage. A robust and efficient scheme is put forward in this study to maintain data integrity in cases that involve public auditing. In this way, multiuser modification can be used to check the public integrity for cloud data and reduce the auditing cost.
The proposed scheme uses public key cryptography equipped with a proxy re-encryption and a cryptographic hash function. We allow a third-party auditor (TPA) to conduct preprocessing of data for the sake of cloud users prior to uploading these data to the cloud service providers (CSPs) and then verify the integrity of data. We also allow the TPA to perform re-encryption of data for sharing data without losing privacy. The scheme is characterised by significant security features, such as management of key, privacy, low-cost computation, exchange of key, freeing clients from burdens, failure of CSPs in creating right verifier response in absence of data and one-time key requirement. Numerical analysis and extensive experimental results verify that the proposed scheme is efficient and scalable.

References

[1]
Y. Li, Y. Yu, B. Yang, G. Min, and H Wu (2018). Privacy preserving cloud data auditing with efficient key update. Future Generation Computer Systems, 78(2), 789--798.
[2]
H. Tian, F. Nan, H. Jiang, C.Chang, J. Ning, and Y. Huang (2019). Public auditing for shared cloud data with efficient and secure group management. Information Sciences, 472, 107--125.
[3]
J. Ni, Y. Yu, Y. Mu, and Q. Xia (2014). On the security of an efficient dynamic auditing protocol in cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25(10), 2760--2761.
[4]
Y. Yu, Y. Li, J. Ni, G. Yang, Y. Mu, and W. Susilo (2015). Comments on public integrity auditing for dynamic data sharing with multi-user modification. IEEE Transactions on Information Forensics and Security, 10(99), 1--15.
[5]
Y. Luo, M. Xu, K. Huang, D. Wang, and S. Fu (2018). Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. Computers & Security, 73, 492--506.
[6]
Y. Yan, L. Wu, G. Gao, H. Wang, and W. Xu (2018). A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter. Journal of Information Security and Applications, 39, 10--18.
[7]
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia (2009). Dynamic provable data possession. Proceedings of the 16th ACM Conference on Computer and Communications Security, USA, 213--222.
[8]
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou (2009). Enabling public verifiability and data dynamics for storage security in cloud computing. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09), France, Springer, 355--370.
[9]
C. Wang, Q. Wang, K. Ren, and W. Lou (2009). Ensuring data storage security in cloud computing. In Proceedings of the 17th International Workshop on Quality of Service (IWQoS'09), USA, 1--9.
[10]
B. Chen, R. Curtmola, G. Ateniese, and R. Burns (2010). Remote data checking for network coding-based distributed storage systems. In Proceedings of the ACM Workshop on Cloud Computing Security Workshop (CCSW'10), USA, 31--42.
[11]
Z. Hussien, H. Jin, Z. Abduljabbar, A. Yassin, M. Hussain, S. Abbdal and D. Zou (2015). Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext. In Proceedings of 11th International Conference on Information Assurance and Security (IAS), Marrakech, 73--78.
[12]
N. Cao, S. Yu, Z. Yang, W. Lou, and Y. Hou (2012). Lt codes-based secure and reliable cloud storage service. In Proceedings IEEE INFOCOM, USA, 693--701.
[13]
B. Wang, B. Li, H. Li, and F. Li (2013). Certificateless public auditing for data integrity in the cloud. In Proceedings of the IEEE Conference on Communications and Network Security, USA, 136--144.
[14]
B. Wang, B. Li, and H. Li (2012). Oruta: Privacy-preserving public auditing for shared data in the cloud. In Proceedings of IEEE 5th International Conference on Cloud Computing, USA, 295--302.
[15]
J. Zhang and Z. Zhang (2015). Secure and efficient data-sharing in clouds. Concurrency and Computation: Practice and Experience, 27(8), 2125--2143.

Cited By

View all
  • (2023)Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT SystemsApplied Sciences10.3390/app1302069113:2(691)Online publication date: 4-Jan-2023

Index Terms

  1. An Efficient and Secure Scheme for Dynamic Shared Data in Cloud

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSAE '19: Proceedings of the 3rd International Conference on Computer Science and Application Engineering
    October 2019
    942 pages
    ISBN:9781450362948
    DOI:10.1145/3331453
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 October 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Dynamic auditing
    2. One-time key
    3. Proxy re-encryption
    4. Shared data integrity
    5. Third party auditor

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CSAE 2019

    Acceptance Rates

    Overall Acceptance Rate 368 of 770 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT SystemsApplied Sciences10.3390/app1302069113:2(691)Online publication date: 4-Jan-2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media