A threshold hybrid encryption method for integrity audit without trusted center
Tóm tắt
Cloud storage with sharing services is increasingly popular among data owners. However, it is difficult for the users to know if the cloud server providers (CSPs) indeed protect their data. To verify data integrity and preserve data and key privacy in the group, this paper proposes a new threshold hybrid encryption for integrity auditing method without trusted center. The proposed method is developed based on the Advanced Encryption Standard (AES) and the Elliptic Curve Cryptography (ECC) with Shamir secret sharing. In this way, the key can be distributed and managed without trusted center, preserving the privacy of the key of the AES and users’ private key. Besides, we design and implement a novel integrity auditing and re-signature method which verifies the data integrity and solves the collusion question of the cloud and the revoked users. Security analysis and performance evaluation demonstrate that the proposed scheme realizes the correctness, security, and efficiency with a low communication and computation cost.
Tài liệu tham khảo
Wu D, Au MH, Yan J, Wang H, Wu D, Wang R, et al (2017) Social attribute aware incentive mechanisms for video distribution in device-to-device communications. IEEE Trans Multimed 19(8):1908–1920.
Wu D, Liu Q, Wang H, Wu D, Wang R (2017) Socially aware energy efficient mobile edge collaboration for video distribution. IEEE Trans Multimed 19(10):2197–2209. doi:10.1109/TMM.2017.2733300.
Sangaiah AK, Hosseinabadi AAR, Sadeghilalimi M, Zhang W (2019) Energy consumption in point-coverage wireless sensor networks via bat algorithm. IEEE Access:1–1. doi:10.1109/ACCESS.2019.2952644.
Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensic Secur 12(10):2402–2415. doi:10.1109/TIFS.2017.2705620.
Green M (2013) The threat in the cloud. IEEE Sec Priv 11(1):86–89. doi:10.1109/MSP.2013.20.
Fernandes DA, Soares LF, Gomes JV, Freire MM, Inácio PR (2014) Security issues in cloud environments: a survey. Int J Inf Sec 13(2):113–170. doi:10.1007/s10207-013-0208-7.
Dudin E, Smetanin YG (2011) A review of cloud computing. Sci Tech Inf Process 38(4):280–284. doi:10.3103/S0147688211040083.
Wang B, Li B, Li H (2013) Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92–106. doi:10.1109/TSC.2013.2295611.
Li J, Yan H, Zhang Y (2018) Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans Serv Comput:1–12. doi:10.1109/TSC.2018.2789893.
Wang XA, Liu Y, Sangaiah AK, Zhang J (2019) Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting. Computing 101(7):773–790. https://doi.org/10.1007/s00607-018-0641-6.
Kim D, Kwon H, Hahn C, Hur J (2016) Privacy-preserving public auditing for educational multimedia data in cloud computing. Multimed Tools Appl 75(21):13077–13091. doi:10.1007/s11042-015-2594-5.
Zhang Y, Xu C, Li H, Liang X (2016) Cryptographic public verification of data integrity for cloud storage systems. IEEE Cloud Comput 3(5):44–52. doi:10.1109/MCC.2016.94.
Zhang J, Wang B, He D, et al (2019) Improved secure fuzzy auditing protocol for cloud data storage. Soft Comput 23(10):3411–3422. https://doi.org/10.1007/s00500-017-3000-1.
Fu A, Shui Y, Zhang Y, Wang H, Huang C (2017) NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans Big Data 99:1–1. doi:10.1109/TBDATA.2017.2701347.
Shen W, Yu J, Xia H, Zhang H, Lu X, Hao R (2017) Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J Netw Comput Appl 82:56–64. doi:10.1016/j.jnca.2017.01.015.
Rodrigues JJPC, Wang X, et al (2018) Guest editorial Special Issue on integrated computing: computational intelligence paradigms and Internet of Things for industrial applications. IEEE Internet of Things J 5(3):1572–1574. doi:10.1109/JIOT.2018.2838958.
Phong LT, Aono Y, Hayashi T, Wang L, Moriai S (2018) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf Forensic Secur 13(5):1333–1345. doi:10.1109/TIFS.2017.2787987.
Phong LT, Phuong TT (2019) Privacy-preserving deep learning via weight transmission. IEEE Trans Inf Forensics Secur 14(11):3003–3015. doi:10.1109/TIFS.2019.2911169.
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, et al (2007) Provable data possession at untrusted stores In: Proceedings of the 14th ACM conference on Computer and communications security, 598–609.. ACM. doi:10.1145/1315245.1315318.
Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession In: Proceedings of the 4th international conference on Security and privacy in communication netowrks, 1–9.. ACM. doi:10.1145/1460877.1460889.
Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing In: European symposium on research in computer security, 355–370.. Springer, Berlin. doi:10.1007/978-3-642-04444-1\_22.
Guo C, Luo N, Bhuiyan MZA, Jie Y, Chen Y, Feng B, et al (2018) Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage. Futur Gener Comput Syst 84:190–199. doi:10.1016/j.future.2017.07.038.
Shen W, Qin J, Yu J, Hao R, Hu J (2019) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensic Secur 14(2):331–346. doi:10.1109/TIFS.2018.2850312.
Chi PW, Lei CL (2015) Audit-free cloud, Storage via deniable attribute-based encryption. IEEE Trans Cloud Comput 6(2):414–427. doi:10.1109/TCC.2015.2424882.
Yu J, Wang H (2017) Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans Inf Forensic Secur 12(8):1931–1940. doi:10.1109/TIFS.2017.2695449.
Harn L (1994) Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc Comput Digit Techniques 141(5):307–313. doi:10.1049/ip-cdt:19941293.
Wang H (2014) Identity-based distributed provable data possession in multicloud storage. IEEE Trans Serv Comput 8(2):328–340. doi:10.1109/TSC.2014.1.
Nagar P, Sethia D (2017) Group authorization using threshold signatures for medical procedures In: 2017 9th International Conference on Communication Systems and Networks (COMSNETS), 492–497.. IEEE. doi:10.1109/COMSNETS.2017.7945441.
Harn L, Wang F (2016) Threshold signature scheme without using polynomial interpolation. IJ Netw Secur 18(4):710–717.
Shen J, Zheng WY, Wang J, Zheng YH, Sun XM, Lee SY (2013) An efficient verifiably encrypted signature from weil pairing. J Internet Technol 14(6):947–952.
Rabaninejad R, Ahmadian AM, Asaar M, Aref M (2019) A lightweight auditing service for shared data with secure user revocation in cloud storage. IEEE Trans Serv Comput:1–1. doi:10.1109/TSC.2019.2919627.
Zhang Y, Yu J, Hao R, Wang C, Ren K (2020) Enabling effcient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans Dependable Secure Comput 17(3):608–619.
Martin KM (2005) Dynamic access policies for unconditionally secure secret sharing schemes In: IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 61–66.. IEEE. doi:10.1109/ITWTPI.2005.1543958.
Jie Y, Yu L, Li-yun C, Wei N (2016) A SM2 elliptic curve threshold signature scheme without a trusted center. KSII Trans Internet Inf Syst 10(2):897–913. doi:10.3837/tiis.2016.02.025.
Shimbre N, Deshpande P (2015) Enhancing Distributed Data Storage security for cloud computing using TPA and AES algorithm In: 2015 International Conference on Computing Communication Control and Automation, 35–39.. IEEE. doi:10.1109/ICCUBEA.2015.16.
Wang B, Li B, Li H (2014) Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans Cloud Comput 2(1):43–56. doi:10.1109/TCC.2014.2299807.
Sangaiah AK, Medhane DV, Han T, Hossain MS, Muhammad G (2019) Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics. IEEE Trans Ind Inform 15(7):4189–4196. doi:10.1109/TII.2019.2898174.
Sangaiah AK, Medhane DV, Bian G, Ghoneim A, Alrashoud M, Hossain MS (2019) Energy-aware green adversary model for Cyber physical security in industrial system. IEEE Trans Ind Inform:1–1. doi:10.1109/TII.2019.2953289.
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613. doi:10.1145/359168.359176.
Wu D, Si S, Wu S, Wang R (2017) Dynamic trust relationships aware data privacy protection in mobile crowd-sensing. IEEE Internet Things J:10. doi:10.1109/JIOT.2017.2768073.
Zhu Y, Zhang Y (2006) Elliptic curve public key cryptosystem guidance, 246.. Science Press, Beijing.
Jiang T, Chen X, Ma J (2015) Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans Comput 65(8):2363–2373. doi:10.1109/TC.2015.2389955.
Yuan J, Yu S (2015) Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans Inf Forensic Secur 10(8):1717–1726. doi:10.1109/TIFS.2015.2423264.
Liu CW, Hsien WF, Yang CC, Hwang MS (2016) A survey of public auditing for shared data storage with user revocation in cloud computing. IJ Netw Secur 18(4):650–666.
Wang XA, Weng J, Ma J, Yang X (2019) Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification. Inf Sci 488:13–18. https://doi.org/10.1016/j.ins.2019.03.002.