A new public remote integrity checking scheme with user and data privacy

With cloud storage, users can store their data files on a remote cloud server with a high quality on-demand cloud service and are able to share their data with other users. Since cloud servers usually are not regarded as fully trusted and the cloud data can be shared amongst users, the integrity che...

Full description

Saved in:
Bibliographic Details
Main Authors: FENG, Yiteng, MU, Yi, YANG, Guomin, LIU, Joseph
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2017
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7425
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8428
record_format dspace
spelling sg-smu-ink.sis_research-84282022-10-13T03:42:02Z A new public remote integrity checking scheme with user and data privacy FENG, Yiteng MU, Yi YANG, Guomin LIU, Joseph With cloud storage, users can store their data files on a remote cloud server with a high quality on-demand cloud service and are able to share their data with other users. Since cloud servers usually are not regarded as fully trusted and the cloud data can be shared amongst users, the integrity checking of the remote files has become an important issue. A number of remote data integrity checking protocols have been proposed in the literature to allow public auditing of cloud data by a third party auditor (TPA). However, user privacy is not taken into account in most of the existing protocols. We believe that preserving the anonymity (i.e., identity privacy) of the data owner is also very important in many applications. In this paper, we propose a new remote integrity checking scheme which allows the cloud server to protect the identity information of the data owner against the TPA. We also define a formal security model to capture the requirement of user anonymity, and prove the anonymity of the proposed scheme. Moreover, we improve the existing security model for data privacy against the TPA, and show that an extended version of our protocol is secure under the strengthened security model. 2017-01-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/7425 info:doi/10.1504/IJACT.2017.086232 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Cloud storage Data integrity Data privacy Identity privacy Public auditing Data Storage Systems Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Cloud storage
Data integrity
Data privacy
Identity privacy
Public auditing
Data Storage Systems
Information Security
spellingShingle Cloud storage
Data integrity
Data privacy
Identity privacy
Public auditing
Data Storage Systems
Information Security
FENG, Yiteng
MU, Yi
YANG, Guomin
LIU, Joseph
A new public remote integrity checking scheme with user and data privacy
description With cloud storage, users can store their data files on a remote cloud server with a high quality on-demand cloud service and are able to share their data with other users. Since cloud servers usually are not regarded as fully trusted and the cloud data can be shared amongst users, the integrity checking of the remote files has become an important issue. A number of remote data integrity checking protocols have been proposed in the literature to allow public auditing of cloud data by a third party auditor (TPA). However, user privacy is not taken into account in most of the existing protocols. We believe that preserving the anonymity (i.e., identity privacy) of the data owner is also very important in many applications. In this paper, we propose a new remote integrity checking scheme which allows the cloud server to protect the identity information of the data owner against the TPA. We also define a formal security model to capture the requirement of user anonymity, and prove the anonymity of the proposed scheme. Moreover, we improve the existing security model for data privacy against the TPA, and show that an extended version of our protocol is secure under the strengthened security model.
format text
author FENG, Yiteng
MU, Yi
YANG, Guomin
LIU, Joseph
author_facet FENG, Yiteng
MU, Yi
YANG, Guomin
LIU, Joseph
author_sort FENG, Yiteng
title A new public remote integrity checking scheme with user and data privacy
title_short A new public remote integrity checking scheme with user and data privacy
title_full A new public remote integrity checking scheme with user and data privacy
title_fullStr A new public remote integrity checking scheme with user and data privacy
title_full_unstemmed A new public remote integrity checking scheme with user and data privacy
title_sort new public remote integrity checking scheme with user and data privacy
publisher Institutional Knowledge at Singapore Management University
publishDate 2017
url https://ink.library.smu.edu.sg/sis_research/7425
_version_ 1770576337192353792