Attribute-based cloud data integrity auditing for secure outsourced storage
Outsourced storage such as cloud storage can significantly reduce the burden of data management of data owners. Despite of a long list of merits of cloud storage, it triggers many security risks at the same time. Data integrity, one of the most burning challenges in secure cloud storage, is a fundam...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7289 https://ink.library.smu.edu.sg/context/sis_research/article/8292/viewcontent/08057855.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8292 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-82922022-09-29T07:43:37Z Attribute-based cloud data integrity auditing for secure outsourced storage YU, Yong LI, Yannan YANG, Bo SUSILO, Willy YANG, Guomin BAI, Jian Outsourced storage such as cloud storage can significantly reduce the burden of data management of data owners. Despite of a long list of merits of cloud storage, it triggers many security risks at the same time. Data integrity, one of the most burning challenges in secure cloud storage, is a fundamental and pivotal element in outsourcing services. Outsourced data auditing protocols enable a verifier to efficiently check the integrity of the outsourced files without downloading the entire file from the cloud, which can dramatically reduce the communication overhead between the cloud server and the verifier. Existing protocols are mostly based on public key infrastructure or an exact identity, which lacks flexibility of key management. In this paper, we seek to address the complex key management challenge in cloud data integrity checking by introducing attribute-based cloud data auditing, where users can upload files to cloud through some customized attribute set and specify some designated auditor set to check the integrity of the outsourced data. We formalize the system model and the security model for this new primitive, and describe a concrete construction of attribute-based cloud data integrity auditing protocol. The new protocol offers desirable properties namely attribute privacy-preserving and collusion-resistance. We prove soundness of our protocol based on the computational Diffie-Hellman assumption and the discrete logarithm assumption. Finally, we develop a prototype of the protocol which demonstrates the practicality of the protocol. 2020-04-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7289 info:doi/10.1109/TETC.2017.2759329 https://ink.library.smu.edu.sg/context/sis_research/article/8292/viewcontent/08057855.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Cloud storage data integrity attribute-based cryptography threshold secret sharing Data Storage Systems Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Cloud storage data integrity attribute-based cryptography threshold secret sharing Data Storage Systems Information Security |
spellingShingle |
Cloud storage data integrity attribute-based cryptography threshold secret sharing Data Storage Systems Information Security YU, Yong LI, Yannan YANG, Bo SUSILO, Willy YANG, Guomin BAI, Jian Attribute-based cloud data integrity auditing for secure outsourced storage |
description |
Outsourced storage such as cloud storage can significantly reduce the burden of data management of data owners. Despite of a long list of merits of cloud storage, it triggers many security risks at the same time. Data integrity, one of the most burning challenges in secure cloud storage, is a fundamental and pivotal element in outsourcing services. Outsourced data auditing protocols enable a verifier to efficiently check the integrity of the outsourced files without downloading the entire file from the cloud, which can dramatically reduce the communication overhead between the cloud server and the verifier. Existing protocols are mostly based on public key infrastructure or an exact identity, which lacks flexibility of key management. In this paper, we seek to address the complex key management challenge in cloud data integrity checking by introducing attribute-based cloud data auditing, where users can upload files to cloud through some customized attribute set and specify some designated auditor set to check the integrity of the outsourced data. We formalize the system model and the security model for this new primitive, and describe a concrete construction of attribute-based cloud data integrity auditing protocol. The new protocol offers desirable properties namely attribute privacy-preserving and collusion-resistance. We prove soundness of our protocol based on the computational Diffie-Hellman assumption and the discrete logarithm assumption. Finally, we develop a prototype of the protocol which demonstrates the practicality of the protocol. |
format |
text |
author |
YU, Yong LI, Yannan YANG, Bo SUSILO, Willy YANG, Guomin BAI, Jian |
author_facet |
YU, Yong LI, Yannan YANG, Bo SUSILO, Willy YANG, Guomin BAI, Jian |
author_sort |
YU, Yong |
title |
Attribute-based cloud data integrity auditing for secure outsourced storage |
title_short |
Attribute-based cloud data integrity auditing for secure outsourced storage |
title_full |
Attribute-based cloud data integrity auditing for secure outsourced storage |
title_fullStr |
Attribute-based cloud data integrity auditing for secure outsourced storage |
title_full_unstemmed |
Attribute-based cloud data integrity auditing for secure outsourced storage |
title_sort |
attribute-based cloud data integrity auditing for secure outsourced storage |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2020 |
url |
https://ink.library.smu.edu.sg/sis_research/7289 https://ink.library.smu.edu.sg/context/sis_research/article/8292/viewcontent/08057855.pdf |
_version_ |
1770576304827006976 |