88 research outputs found

    Public cloud data auditing with practical key update and zero knowledge privacy

    Get PDF
    Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user\u27s private auditing key (as well as the authenticators those keys are associated with) without the user\u27s re-possession of the data remains an open problem. In this paper, we propose a key-updating and authenticator-evolving mechanism with zero-knowledge privacy of the stored files for secure cloud data auditing, which incorporates zero knowledge proof systems, proxy re-signatures and homomorphic linear authenticators. We instantiate our proposal with the state-of-the-art Shacham-Waters auditing scheme. When the cloud user needs to update his key, instead of downloading the entire file and re-generating all the authenticators, the user can just download and update the authenticators. This approach dramatically reduces the communication and computation cost while maintaining the desirable security. We formalize the security model of zero knowledge data privacy for auditing schemes in the key-updating context and prove the soundness and zero-knowledge privacy of the proposed construction. Finally, we analyze the complexity of communication, computation and storage costs of the improved protocol which demonstrates the practicality of the proposal

    Cloud Data Auditing Using Proofs of Retrievability

    Full text link
    Cloud servers offer data outsourcing facility to their clients. A client outsources her data without having any copy at her end. Therefore, she needs a guarantee that her data are not modified by the server which may be malicious. Data auditing is performed on the outsourced data to resolve this issue. Moreover, the client may want all her data to be stored untampered. In this chapter, we describe proofs of retrievability (POR) that convince the client about the integrity of all her data.Comment: A version has been published as a book chapter in Guide to Security Assurance for Cloud Computing (Springer International Publishing Switzerland 2015

    Fuzzy identity-based data integrity auditing for reliable cloud storage systems

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.As a core security issue in reliable cloud storage, data integrity has received much attention. Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced data without downloading the data. A key research challenge associated with existing designs of data auditing protocols is the complexity in key management. In this paper, we seek to address the complex key management challenge in cloud data integrity checking by introducing fuzzy identity-based auditing-the first in such an approach, to the best of our knowledge. More specifically, we present the primitive of fuzzy identity-based data auditing, where a user’s identity can be viewed as a set of descriptive attributes. We formalize the system model and the security model for this new primitive. We then present a concrete construction of fuzzy identity-based auditing protocol by utilizing biometrics as the fuzzy identity. The new protocol offers the property of error-tolerance, namely, it binds private key to one identity which can be used to verify the correctness of a response generated with another identity, if and only if both identities are sufficiently close. We prove the security of our protocol based on the computational Diffie-Hellman assumption and the discrete logarithm assumption in the selective-ID security model. Finally, we develop a prototype implementation of the protocol which demonstrates the practicality of the proposal.This work is supported by the National Natural Science Foundation of China (61501333,61300213,61272436,61472083), the Fundamental Research Funds for the Central Universities under Grant ZYGX2015J05

    Review On Preserving Privacy Identity Of Shared Data In Cloud

    Get PDF
    Cloud computing contains groups of remote servers and software networks that involve in allowing storage of data and accessing of online computer resources. Cloud contains data storage to the huge amount of data. Cloud user should be concerned with the correctness and protection of data. When user outsources remote data from storage of data as a cloud, There are Several auditing mechanism to verify the Integrity of Data. Public auditing mechanism enables the user to verify integrity of data with the help of Third Party Auditor (TPA). Public auditing mechanism start auditing task by not downloading whole file. This helps in Preserving privacy of Data. Public auditing will won’t reveal identity of any user. In the paper contains various privacy preserving public auditing mechanism. It also shows comparative study among them. DOI: 10.17762/ijritcc2321-8169.15031

    Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.Remote data integrity checking (RDIC) enables a data storage server, such as a cloud server, to prove to a verifier that it is actually storing a data owner’s data honestly. To date, a number of RDIC protocols have been proposed in the literature, but almost all the constructions suffer from the issue of a complex key management, that is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system complexity and the cost for establishing and managing the public key authentication framework in PKI based RDIC schemes. We formalize ID-based RDIC and its security model including security against a malicious cloud server and zero knowledge privacy against a third party verifier. We then provide a concrete construction of ID-based RDIC scheme which leaks no information of the stored files to the verifier during the RDIC process. The new construction is proven secure against the malicious server in the generic group model and achieves zero knowledge privacy against a verifier. Extensive security analysis and implementation results demonstrate that the proposed new protocol is provably secure and practical in the real-world applications.This work is supported by the National Natural Science Foundation of China (61501333,61300213,61272436,61472083), Fok Ying Tung Education Foundation (141065), Program for New Century Excellent Talents in Fujian University (JA1406

    CONFIDENTIALITY-MAINTAINING PUBLIC ASSESSING FOR RESTORING-CODE-BASED CLOUD STORAGE

    Get PDF
    Several techniques that deal with the sturdiness of outsourced data missing of local copy were recommended in many models up to now. Fliers and card printing of remote trying to find regenerating-coded information provide private auditing, necessitates data keepers to constantly stay web mange auditing. We introduce a apparent auditing method of regeneration-code-basis cloud storage. For solving regeneration impracticality of ineffective authenticators in inadequate data proprietors, we initiate a proxy, which regenerate authenticators, into established public auditing system representation. As opposed to direct improvement in fliers and card printing of public auditing towards multi-server setting, we advise novel authenticator, that's suitable for regenerating codes that's produced by means of several keys and they're regenerated by means of partial keys hence our method can totally make data owner’s burden free

    DISCRETION PROTECTIVE OPEN CHECKING FOR REDEVELOPING CIPHER CREATED HAZE

    Get PDF
    Several techniques that cope with the sturdiness of outsourced data missing of local copy were suggested in lots of models thus far. Fliers and business card printing of remote trying to find regenerating-coded information provide private auditing, necessitates data keepers to constantly stay web mange auditing. We introduce an empty auditing approach to regeneration-code-basis cloud storage. For solving regeneration impracticality of ineffective authenticators in insufficient data proprietors, we initiate a proxy, which regenerate authenticators, into established public auditing system representation. As opposed to direct improvement in fliers and business card printing of public auditing towards multi-server setting, we advise novel authenticator, that's appropriate for regenerating codes that's created by way of several keys and they are regenerated by way of partial keys hence our method can totally make data owner’s burden free
    • …
    corecore