CRUPA: collusion resistant user revocable public auditing of shared data in cloud

Geeta C. Mara1, Usharani Rathod2, Robinson Raju2, Srinivas Raghavendra2, Rajkumar Buyya3, K R Venugopal4, S. Sitharama Iyengar5, L. M. Patnaik6
1Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, Karnataka, India
2Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bengaluru, India
3Cloud Computing and Distributed Systems (CLOUDS) Lab, School of Computing and Information Systems, The University of Melbourne, Melbourne, Australia
4Bangalore University, Bengaluru, India
5Department of Computer Science and Engineering, Florida International University, Miami, USA
6INSA, National Institute of Advanced Studies, Indian Institute of Science Campus, Bengaluru, India

Tóm tắt

AbstractCloud repository is one of the most important services afforded by Cloud Computing where information is preserved, maintained, archived in distant servers and made available to the users over the Internet. Provided with the cloud repository facilities, customers can organize themselves as a cluster and distribute information with one another. In order to allow public integrity auditing on the information stored in semi-trusted cloud server, customers compute the signatures for every chunk of the shared information. When a malicious client is repudiated from the group, the chunks that were outsourced to the cloud server by this renounced customer need to be verified and re-signed by the customer present in the cluster (i.e., the straightforward approach) which results in huge transmission and reckoning cost for the customer. In order to minimize the burden of customers present in the cluster, in the existing scheme Panda, the semi-trusted Cloud Service Provider (CSP) is allowed to compute the Resign key. Further, the CSP audits and re-signs the revoked customer chunks by utilizing the Resign key. So, it is easy for the CSP by colluding with the revoked customer to find the secret keys of the existing customer. We introduce a novel Collusion Resistant User Revocable Public Auditing of Shared Data in Cloud (CRUPA) by making use of the concept of regression technique. In order to secure the secret keys of the existing customers from the CSP, we have allowed the information proprietor to compute the Resign key using the regression technique. Whenever the information proprietor revokes the customer from the cluster, the information proprietor computes the Resign key using the regression technique and sends to the CSP. Further, the CSP audits and re-signs the revoked customer chunks using the Resign key. The Resign key computed by the information proprietor using regression method is highly secure and the malicious CSP cannot find the private information of the customers in the cluster. Besides, our mechanism achieves significant improvement in the computation cost of the Resign key by information proprietor. Further, the proposed scheme is collusion resistant, supports effective and secure customer repudiation, multi-information proprietor batch auditing and is scalable.

Từ khóa


Tài liệu tham khảo

Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable Data Possession at Untrusted Stores In: Proceedings of the 14th ACM Conference on Computer and Communications Security, 598–609. https://doi.org/10.1145/1315245.1315318.

Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and Efficient Provable Data Possession In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, 1–9.. ACM. https://doi.org/10.1145/1460877.1460889.

Ateniese G, Hohenberger S (2005) Proxy Re-signatures: New Definitions, Algorithms, and Applications. Proc 12th ACM Conf Comput Commun Secur:310–319.

Blaze M, Bleumer G, Strauss M (1998) Divertible Protocols and Atomic Proxy Cryptography. Int Conf Theory Appl Cryptographic Tech:127–144. https://doi.org/10.1007/bfb0054122.

Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps:416–432. https://doi.org/10.1007/3-540-39200-9_26.

Boneh D, Lynn B, Shacham H (2004) Short Signatures from the Weil Pairing. J Cryptol 17(4):297–319.

Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Futur Gener Comput Syst 25(6):599–616.

Chen F, Xiang T, Lei X, Chen J (2014) Highly Efficient Linear Regression Outsourcing to a Cloud. IEEE Trans Cloud Comput 2(4):499–508.

Dong X, Yu J, Luo Y, Chen Y, Xue G, Li M (2014) Achieving an Effective, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing. Comput Secur 42:151–164.

Dong X, Yu J, Zhu Y, Chen Y, Luo Y, Li M (2015) SECO: Secure and Scalable Data Collaboration Services in Cloud Computing. Comput Secur 50:91–105.

Erway CC, Küpçü A, Papamanthou C, Tamassia R (2015) Dynamic Provable Data Possession. ACM Trans Inf Syst Secur (TISSEC) 17(4):213–222.

Garg N, Bawa S (2016) Comparative Analysis of Cloud Data Integrity Auditing Protocols. J Netw Comput Appl 66:17–32.

Geeta CM, Raghavendra S, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2018) Data Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions. Int J Comput (IJC) 28(1):8–57.

Hall R, Fienberg SE, Nardi Y (2011) Secure Multiple Linear Regression based on Homomorphic Encryption. J Off Stat 27(4):669.

Hwang JY, Chen L, Cho HS, Nyang D (2015) Short Dynamic Group Signature Scheme Supporting Controllable Linkability. IEEE Trans Inf Forensic Secur 10(6):1109–1124.

Jin H, Jiang H, Zhou K (2018) Dynamic and Public Auditing with Fair Arbitration for Cloud Data. IEEE Trans Cloud Comput 6(3):680–693.

Li J, Yan H, Zhang Y (2018) Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage. IEEE Trans Serv Comput. https://doi.org/10.1109/tsc.2018.2789893.

Li J, Yao W, Han J, Zhang Y, Shen J (2017) User Collusion Avoidance CP-ABE with Efficient Attribute Revocation for Cloud Storage. IEEE Syst J 12(2):1767–1777.

Liu F, Tong J, Mao J, Bohn R, Messina J, Badger L, Leaf D (2011) NIST Cloud Computing Reference Architecture. NIST Spec Publ 500(2011):1–28.

Luo Y, Xu M, Fu S, Wang D, Deng J (2015) Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation In: Trustcom/BigDataSE/ISPA, IEEE, vol. 1, 434–442. https://doi.org/10.1109/trustcom.2015.404.

Pairing Based Cryptography (PBC) Library. http://crypto.stanford.edu/pbc/,2014...

Pattar S, Buyya R, Venugopal KR, Iyengar S, Patnaik L (2018) Searching for the IoT Resources: Fundamentals, Requirements, Comprehensive Review, and Future Directions. IEEE Commun Surv Tutor 20(3):2101–2132.

Raghavendra S, Doddabasappa PA, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2016) Secure Multi-Keyword Search and Multi-User Access Control over an Encrypted Cloud Data. Int J Inf Process 10(2):51–61.

Raghavendra S, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) MSIGT: Most Significant Index Generation Technique for Cloud Environment In: Proceedings of the Annual IEEE India Conference (INDICON), 1–6. https://doi.org/10.1109/indicon.2015.7443531.

Ren K, Wang C, Wang Q (2012) Security Challenges for the Public Cloud. IEEE Internet Comput 16(1):69–73.

Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data. IEEE Trans Inf Forensic Secur 12(10):2402–2415.

Shen W, Qin J, Yu J, Hao R, Hu J (2019) Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage. IEEE Trans Inf Forensic Secur 14(2):331–346.

Tarannum S, Aravinda B, Nalini L, Venugopal KR, Patnaik LM (2006) Routing Protocol for Lifetime Maximization of Wireless Sensor Networks In: International Conference on Advanced Computing and Communications, 401–406.. IEEE. https://doi.org/10.1109/adcom.2006.4289925.

Tate SR, Vishwanathan R, Everhart L (2013) Multi-User Dynamic Proofs of Data Possession using Trusted Hardware In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 353–364. https://doi.org/10.1145/2435349.2435400.

Tian H, Chen Y, Chang CC, Jiang H, Huang Y, Chen Y, Liu J (2017) Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage. IEEE Trans Serv Comput 10(5):701–714.

Tian H, Nan F, Jiang H, Chang CC, Ning J, Huang Y (2019) Public Auditing for Shared Cloud Data with Efficient and Secure Group Management. Inf Sci 472:107–125.

Tian JF, Guo RF, Jing X (2019) Stern-Brocot-based Non-Repudiation Dynamic Provable Data Possession. IEEE Access. https://doi.org/10.1109/access.2019.2916173.

Venugopal KR, Buyya R (2013) Mastering C++. McGraw-Hill Education, New Delhi.

Venugopal KR, Rajan EE, Kumar PS (1998) Performance Analysis of Wavelength Converters in WDM Wavelength Routed Optical Networks In: Proceedings. Fifth International Conference on High Performance Computing (Cat. No. 98EX238), 239–246.. IEEE. https://doi.org/10.1109/hipc.1998.737994.

Venugopal KR, Rajan EE, Kumar PS (1999) Impact of Wavelength Converters in Wavelength Routed All-Optical Networks. Comput Commun 22(3):244–257.

Venugopal KR, Srinivasa KG, Patnaik LM (2009) Soft Computing for Data Mining Applications. Springer. https://doi.org/10.1007/978-3-642-00193-2.

Wang B, Li B, Li H (2012) Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud. Int Conf Appl Crypt Netw Secur:507–525. https://doi.org/10.1007/978-3-642-31284-7_30.

Wang B, Li B, Li H (2014) Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud. IEEE Trans Cloud Comput 2(1):43–56.

Wang B, Li B, Li H (2015) Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. IEEE Trans Serv Comput 8(1):92–106.

Wu TY, Tseng YM, Huang SS, Lai YC (2017) Non-Repudiable Provable Data Possession Scheme with Designated Verifier in Cloud Storage Systems. IEEE Access 5:19333–19341.

Xu X, Zhou J, Wang X, Zhang Y (2016) Multi-Authority Proxy Re-encryption Based on CPABE for Cloud Storage Systems. J Syst Eng Electron 27(1):211–223.

Yan H, Li J, Han J, Zhang Y (2016) A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage. IEEE Trans Inf Forensic Secur 12(1):78–88.

Yan H, Li J, Zhang Y (2019) Remote Data Checking with a Designated Verifier in Cloud Storage. IEEE Syst J. https://doi.org/10.1109/jsyst.2019.2918022.

Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling Public Auditing for Shared Data in Cloud Storage Supporting Identity Privacy and Traceability. J Syst Softw 113:130–139.

Yu Y, Ni J, Xia Q, Wang X, Yang H, Zhang X (2016) SDIVIP2: Shared Data Integrity Verification with Identity Privacy Preserving in Mobile Clouds. Concurr Comput Pract Experience 28(10):2877–2888.

Yuan J, Yu S (2015) Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification. IEEE Trans Inf Forensic Secur 10(8):1717–1726.

Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H, Yau SS (2011) Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds In: Proceedings of the 2011 ACM Symposium on Applied Computing, 1550–1557. https://doi.org/10.1145/1982185.1982514.

Zhu Z, Jiang R (2015) A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud. IEEE Trans Parallel Distrib Syst 27(1):40–50.