A new public remote integrity checking scheme with user and data privacy
With cloud storage, users can store their data files on a remote cloud server with a high quality on-demand cloud service and are able to share their data with other users. Since cloud servers usually are not regarded as fully trusted and the cloud data can be shared amongst users, the integrity che...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7425 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8428 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-84282022-10-13T03:42:02Z A new public remote integrity checking scheme with user and data privacy FENG, Yiteng MU, Yi YANG, Guomin LIU, Joseph With cloud storage, users can store their data files on a remote cloud server with a high quality on-demand cloud service and are able to share their data with other users. Since cloud servers usually are not regarded as fully trusted and the cloud data can be shared amongst users, the integrity checking of the remote files has become an important issue. A number of remote data integrity checking protocols have been proposed in the literature to allow public auditing of cloud data by a third party auditor (TPA). However, user privacy is not taken into account in most of the existing protocols. We believe that preserving the anonymity (i.e., identity privacy) of the data owner is also very important in many applications. In this paper, we propose a new remote integrity checking scheme which allows the cloud server to protect the identity information of the data owner against the TPA. We also define a formal security model to capture the requirement of user anonymity, and prove the anonymity of the proposed scheme. Moreover, we improve the existing security model for data privacy against the TPA, and show that an extended version of our protocol is secure under the strengthened security model. 2017-01-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/7425 info:doi/10.1504/IJACT.2017.086232 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Cloud storage Data integrity Data privacy Identity privacy Public auditing Data Storage Systems Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Cloud storage Data integrity Data privacy Identity privacy Public auditing Data Storage Systems Information Security |
spellingShingle |
Cloud storage Data integrity Data privacy Identity privacy Public auditing Data Storage Systems Information Security FENG, Yiteng MU, Yi YANG, Guomin LIU, Joseph A new public remote integrity checking scheme with user and data privacy |
description |
With cloud storage, users can store their data files on a remote cloud server with a high quality on-demand cloud service and are able to share their data with other users. Since cloud servers usually are not regarded as fully trusted and the cloud data can be shared amongst users, the integrity checking of the remote files has become an important issue. A number of remote data integrity checking protocols have been proposed in the literature to allow public auditing of cloud data by a third party auditor (TPA). However, user privacy is not taken into account in most of the existing protocols. We believe that preserving the anonymity (i.e., identity privacy) of the data owner is also very important in many applications. In this paper, we propose a new remote integrity checking scheme which allows the cloud server to protect the identity information of the data owner against the TPA. We also define a formal security model to capture the requirement of user anonymity, and prove the anonymity of the proposed scheme. Moreover, we improve the existing security model for data privacy against the TPA, and show that an extended version of our protocol is secure under the strengthened security model. |
format |
text |
author |
FENG, Yiteng MU, Yi YANG, Guomin LIU, Joseph |
author_facet |
FENG, Yiteng MU, Yi YANG, Guomin LIU, Joseph |
author_sort |
FENG, Yiteng |
title |
A new public remote integrity checking scheme with user and data privacy |
title_short |
A new public remote integrity checking scheme with user and data privacy |
title_full |
A new public remote integrity checking scheme with user and data privacy |
title_fullStr |
A new public remote integrity checking scheme with user and data privacy |
title_full_unstemmed |
A new public remote integrity checking scheme with user and data privacy |
title_sort |
new public remote integrity checking scheme with user and data privacy |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2017 |
url |
https://ink.library.smu.edu.sg/sis_research/7425 |
_version_ |
1770576337192353792 |