Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Cong Wang,Qian Wang,Kui Ren,Wenjing Lou +3 more
- pp 525-533
TLDR
This paper utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements.Abstract:
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should bring in no new vulnerabilities towards user data privacy. In this paper, we utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient.read more
Citations
More filters
Journal ArticleDOI
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing
Journal ArticleDOI
A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things
TL;DR: In this scheme, a secure data-sharing framework is designed based on identity authentication and Hyperledger Fabric to ensure the security of data sharing and a community detection algorithm is proposed to divide the clients into different data- sharing communities according to the similarity of label data.
Patent
A Security and Trust Framework for Virtualized Networks
TL;DR: In this paper, the authors propose a framework, apparatus, system and method for realizing security and trust management for virtualized networks, which consists of a root-trusted module layer, which includes a root trust module for providing root trust; and a middleware layer which includes system-level components configured to manage security of virtualized network functions by verifying, establishing or maintaining trust with regard to the virtualised network functions based on root trust.
Proceedings ArticleDOI
Security and Privacy of Sensitive Data in Cloud Computing: A Survey of Recent Developments
Ali Gholami,Erwin Laure +1 more
TL;DR: The existing technologies and a wide array of both earlier and state-of-the-art projects on cloud security and privacy are reviewed, in addition to reviewing the existing developments in privacy-preserving sensitive data approaches in cloud computing such as privacy threat modeling and privacy enhancing protocols and solutions.
Proceedings ArticleDOI
Study on Data Security Policy Based on Cloud Storage
TL;DR: The purpose of this paper is to achieve data security of cloud storage and to formulate corresponding cloud storage security policy using the results of existing academic research by analyzing the security risks of user data in cloud storage.
References
More filters
Journal Article
Above the Clouds: A Berkeley View of Cloud Computing
Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,Randy H. Katz,Andy Konwinski,Gunho Lee,David A. Patterson,Ariel Rabkin,Ion Stoica,Matei Zaharia +10 more
TL;DR: This work focuses on SaaS Providers (Cloud Users) and Cloud Providers, which have received less attention than SAAS Users, and uses the term Private Cloud to refer to internal datacenters of a business or other organization, not made available to the general public.
Book ChapterDOI
Short Signatures from the Weil Pairing
Dan Boneh,Ben Lynn,Hovav Shacham +2 more
TL;DR: A short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves is introduced, designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.
Journal ArticleDOI
Efficient signature generation by smart cards
TL;DR: An efficient algorithm that preprocesses the exponentiation of a random residue modulo p is presented, which improves the ElGamal signature scheme in the speed of the procedures for the generation and the verification of signatures and also in the bit length of signatures.
Posted Content
Provable Data Possession at Untrusted Stores.
Giuseppe Ateniese,Randal Burns,Reza Curtmola,Joseph Herring,Lea Kissner,Zachary N. J. Peterson,Dawn Song +6 more
TL;DR: Ateniese et al. as discussed by the authors introduced the provable data possession (PDP) model, which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.
Journal ArticleDOI
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval,Jacques Stern +1 more
TL;DR: It is proved that a very slight variation of the well-known El Gamal signature scheme resists existential forgeries even against an adaptively chosen-message attack and an appropriate notion of security related to the setting of electronic cash is defined.