Welcome To WUJNS
武汉大学学报 英文版 | Wuhan University Journal of Natural Sciences
Wan Fang
CNKI
CSCD
Wuhan University
Latest Article
Public Auditing for Shared Data Utilizing Backups with User Revoca-tion in the Cloud
Time:2018-3-29  
LIU Hequn, WANG Baocang, LU Ke, GAO Ziyuan, ZHAN Yu
1. State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071, Shaanxi, China; 2. Key Laboratory of Cognitive Radio and Information Processing of Ministry of Education, Guilin University of Electronic Technology, Guilin 541004, Guangxi, China
Abstract:
With the advent of cloud storage, users can share their own data in the remote cloud as a group. To ensure the security of stored data and the normal operation of public auditing, once a user is revoked from the user group, the data files he signed should be resigned by other legal users in the group. In this paper, we propose a new re-signature scheme utilizing backup files to rebuild data which can resist the collusion between the cloud and revoked users, and we use Shamir Secret Sharing Scheme to encrypt data in the multi-managers system which can separate the authority of the group managers. Moreover, our scheme is more practical because we do not need managers to be online all the time. Performance evaluation shows that our mechanism can improve the efficiency of the process of data re-signature.
Key words:user revocation; backups; collusion attack; Shamir Secret Sharing Scheme
CLC number:TP 309.7
References:
[1]	Armbrus M, Fox A, Griffith R, et al. A view of cloud com-puting[J]. Communications of the ACM, 2010, 53(4): 50-58.
[2]	Cachin C, Keidar I, Shraer A. Trusting the cloud [J]. ACM Sigact News, 2009, 40(2): 81-86.
[3]	Ren K, Wang C, Wang Q. Security challenges for the public cloud[J]. IEEE Internet Computing, 2012, 16(1): 69-73.
[4]	Zhu Y, Ahn G J, Hu H, et al. Dynamic audit services for outsourced storages in clouds[J]. IEEE Transactions on Services Computing, 2013, 6(2): 227-238.
[5]	Cao N, Yu S, Yang Z, et al. LT codes-based secure and reliable cloud storage service[J]. Proceedings-IEEE INFOCOM, 2012, 131(5): 693-701.
[6]	Yuan J, Yu S. Proofs of retrievability with public verifiability and constant communication cost in cloud [C]// In-ternational Workshop on Security in Cloud Computing. New York: ACM, 2013: 19-26.
[7]	Wang H. Proxy provable data possession in public clouds[J]. IEEE Transactions on Services Computing, 2013, 6(4): 551- 559.
[8]	Wang B Y, Li B C, Li H. Oruta: Privacy-preserving public auditing for shared data in the cloud[J]. IEEE Transactions on Cloud Computing, 2014, 2(1): 43-56.
[9]	Jiang T, Chen X F, Ma J F. Public integrity auditing for shared dynamic cloud data with group user revocation[J]. IEEE Transactions on Computers, 2016, 65(8): 2363-2373.
[10]	Wang B Y, Li B C, Li H. Panda: Public auditing for shared data with efficient user revocation in the cloud[J]. IEEE Transactions on Services Computing, 2015, 8(1): 92-106.
[11]	Wang B, Li B, Li H. Knox: Privacy-preserving auditing for shared data with large groups in the cloud[C]// International Conference on Applied Cryptography and Network Security. Berlin: Springer-Verlag, 2012: 507-525.
[12]	Wang B Y, Li H, Li M. Privacy-preserving public auditing for shared cloud data supporting group dynamics[C]// IEEE International Conference on Communications. Piscataway: IEEE, 2013: 1946-1950.
[13]	Wang B Y, Chow S, Li M, et al. Storing shared data on the cloud via security-mediator[C]//IEEE, International Conference on Distributed Computing Systems. Piscataway: IEEE, 2013: 124-133.
[14]	Yuan J W, Yu S C. Efficient public integrity checking for cloud data sharing with multi-user modification[C]// INFOCOM, 2014 Proceedings IEEE. Piscataway: IEEE, 2014: 2121- 2129.
[15]	Luo Y C, Xu M, Fu S J, et al. Efficient integrity auditing for shared data in the cloud with secure user revocation[C]// IEEE Trustcom/bigdatase/ispa. Piscataway: IEEE, 2015: 434- 442.
[16]	Jiang T, Chen X F, Ma J F. Public integrity auditing for shared dynamic cloud data with group user revocation[J]. IEEE Transactions on Computers, 2016, 65(8): 2363-2373.
[17]	Alshaimaa A, Nagwa L. Mohamed F. Data storage security service in cloud computing: Challenges and solutions[J]. Multimedia Forensics and Security, 2017, 115: 25-57.
Welcome To WUJNS

HOME | Aim and Scope | Editoral Board | Current Issue | Back Issue | Subscribe | Crosscheck | Polishing | Contact us Copyright © 1997-2018 All right reserved