Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures

In this paper, we study the problem of secure cloud storage in a multi-user setting such that the ownership of outsourced files can be hidden against the cloud server. There is a group manager for initiating the system, who is also responsible for issuing private keys for the involved group members....

全面介紹

Saved in:
書目詳細資料
Main Authors: WANG, Yujue, WU, Qianhong, QIN, Bo, CHEN, Xiaofeng, HUANG, Xinyi, LOU, Jungang
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 2016
主題:
在線閱讀:https://ink.library.smu.edu.sg/sis_research/3627
https://ink.library.smu.edu.sg/context/sis_research/article/4628/viewcontent/OwnershipHiddenGroupOrientatesProofs_2016.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Singapore Management University
語言: English
實物特徵
總結:In this paper, we study the problem of secure cloud storage in a multi-user setting such that the ownership of outsourced files can be hidden against the cloud server. There is a group manager for initiating the system, who is also responsible for issuing private keys for the involved group members. All authorized members are able to outsource files to the group’s storage account at some cloud server. Although the ownership of outsourced file is preserved against the cloud server, the group manager could trace the true identity of any suspicious file for liability investigation. To address this issue, we introduce and formalize a notion of ownership-hidden group-oriented proofs of storage (OPoS). We present a generic OPoS construction from pre-homomorphic signatures, and propose an OPoS instantiation by employing the Boneh–Boyen short signature. We show that the OPoS instantiation can be optimized using a polynomial commitment technique, so that the integrity auditing protocol would only take constant-size communication overheads by the cloud server. Theoretical and experimental analyses show that our OPoS instantiations are efficient and practical for enterprise-oriented cloud storage applications. Also, we show that the OPoS instantiations can be enhanced to safeguard against a dynamic set of corrupted members, as well as support batch integrity auditing mechanism.