File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-319-40253-6_24
- Scopus: eid_2-s2.0-84978252395
- WOS: WOS:000386508700024
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Public cloud data auditing with practical key update and zero knowledge privacy
Title | Public cloud data auditing with practical key update and zero knowledge privacy |
---|---|
Authors | |
Issue Date | 2016 |
Citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, v. 9722, p. 389-405 How to Cite? |
Abstract | © Springer International Publishing Switzerland 2016. Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user’s private auditing key (as well as the authenticators those keys are associated with) without the user’s re-possession of the data remains an open problem. In this paper, we propose a key-updating and authenticator-evolving mechanism with zero-knowledge privacy of the stored files for secure cloud data auditing, which incorporates zero knowledge proof systems, proxy re-signatures and homomorphic linear authenticators. We instantiate our proposal with the state-of-the-art Shacham-Waters auditing scheme. When the cloud user needs to update his key, instead of downloading the entire file and re-generating all the authenticators, the user can just download and update the authenticators. This approach dramatically reduces the communication and computation cost while maintaining the desirable security. We formalize the security model of zero knowledge data privacy for auditing schemes in the key-updating context and prove the soundness and zero-knowledge privacy of the proposed construction. Finally, we analyze the complexity of communication, computation and storage costs of the improved protocol which demonstrates the practicality of the proposal. |
Persistent Identifier | http://hdl.handle.net/10722/280590 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yu, Yong | - |
dc.contributor.author | Li, Yannan | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Choo, Kim Kwang Raymond | - |
dc.contributor.author | Zhang, Xinpeng | - |
dc.date.accessioned | 2020-02-17T14:34:25Z | - |
dc.date.available | 2020-02-17T14:34:25Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, v. 9722, p. 389-405 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280590 | - |
dc.description.abstract | © Springer International Publishing Switzerland 2016. Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user’s private auditing key (as well as the authenticators those keys are associated with) without the user’s re-possession of the data remains an open problem. In this paper, we propose a key-updating and authenticator-evolving mechanism with zero-knowledge privacy of the stored files for secure cloud data auditing, which incorporates zero knowledge proof systems, proxy re-signatures and homomorphic linear authenticators. We instantiate our proposal with the state-of-the-art Shacham-Waters auditing scheme. When the cloud user needs to update his key, instead of downloading the entire file and re-generating all the authenticators, the user can just download and update the authenticators. This approach dramatically reduces the communication and computation cost while maintaining the desirable security. We formalize the security model of zero knowledge data privacy for auditing schemes in the key-updating context and prove the soundness and zero-knowledge privacy of the proposed construction. Finally, we analyze the complexity of communication, computation and storage costs of the improved protocol which demonstrates the practicality of the proposal. | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.title | Public cloud data auditing with practical key update and zero knowledge privacy | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-319-40253-6_24 | - |
dc.identifier.scopus | eid_2-s2.0-84978252395 | - |
dc.identifier.volume | 9722 | - |
dc.identifier.spage | 389 | - |
dc.identifier.epage | 405 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.identifier.isi | WOS:000386508700024 | - |
dc.identifier.issnl | 0302-9743 | - |