File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/s10207-014-0263-8
- Scopus: eid_2-s2.0-85028197535
- WOS: WOS:000358193000002
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
Title | Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage |
---|---|
Authors | |
Keywords | Data integrity Cloud computing Remote data integrity checking Privacy |
Issue Date | 2015 |
Citation | International Journal of Information Security, 2015, v. 14, n. 4, p. 307-318 How to Cite? |
Abstract | © 2014, Springer-Verlag Berlin Heidelberg. Remote data integrity checking (RDIC) enables a server to prove to an auditor the integrity of a stored file. It is a useful technology for remote storage such as cloud storage. The auditor could be a party other than the data owner; hence, an RDIC proof is based usually on publicly available information. To capture the need of data privacy against an untrusted auditor, Hao et al. formally defined “privacy against third party verifiers” as one of the security requirements and proposed a protocol satisfying this definition. However, we observe that all existing protocols with public verifiability supporting data update, including Hao et al.’s proposal, require the data owner to publish some meta-data related to the stored data. We show that the auditor can tell whether or not a client has stored a specific file and link various parts of those files based solely on the published meta-data in Hao et al.’s protocol. In other words, the notion “privacy against third party verifiers” is not sufficient in protecting data privacy, and hence, we introduce “zero-knowledge privacy” to ensure the third party verifier learns nothing about the client’s data from all available information. We enhance the privacy of Hao et al.’s protocol, develop a prototype to evaluate the performance and perform experiment to demonstrate the practicality of our proposal. |
Persistent Identifier | http://hdl.handle.net/10722/280635 |
ISSN | 2023 Impact Factor: 2.4 2023 SCImago Journal Rankings: 0.878 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yu, Yong | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Mu, Yi | - |
dc.contributor.author | Tang, Shaohua | - |
dc.contributor.author | Ren, Jian | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Dong, Liju | - |
dc.date.accessioned | 2020-02-17T14:34:32Z | - |
dc.date.available | 2020-02-17T14:34:32Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | International Journal of Information Security, 2015, v. 14, n. 4, p. 307-318 | - |
dc.identifier.issn | 1615-5262 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280635 | - |
dc.description.abstract | © 2014, Springer-Verlag Berlin Heidelberg. Remote data integrity checking (RDIC) enables a server to prove to an auditor the integrity of a stored file. It is a useful technology for remote storage such as cloud storage. The auditor could be a party other than the data owner; hence, an RDIC proof is based usually on publicly available information. To capture the need of data privacy against an untrusted auditor, Hao et al. formally defined “privacy against third party verifiers” as one of the security requirements and proposed a protocol satisfying this definition. However, we observe that all existing protocols with public verifiability supporting data update, including Hao et al.’s proposal, require the data owner to publish some meta-data related to the stored data. We show that the auditor can tell whether or not a client has stored a specific file and link various parts of those files based solely on the published meta-data in Hao et al.’s protocol. In other words, the notion “privacy against third party verifiers” is not sufficient in protecting data privacy, and hence, we introduce “zero-knowledge privacy” to ensure the third party verifier learns nothing about the client’s data from all available information. We enhance the privacy of Hao et al.’s protocol, develop a prototype to evaluate the performance and perform experiment to demonstrate the practicality of our proposal. | - |
dc.language | eng | - |
dc.relation.ispartof | International Journal of Information Security | - |
dc.subject | Data integrity | - |
dc.subject | Cloud computing | - |
dc.subject | Remote data integrity checking | - |
dc.subject | Privacy | - |
dc.title | Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/s10207-014-0263-8 | - |
dc.identifier.scopus | eid_2-s2.0-85028197535 | - |
dc.identifier.volume | 14 | - |
dc.identifier.issue | 4 | - |
dc.identifier.spage | 307 | - |
dc.identifier.epage | 318 | - |
dc.identifier.eissn | 1615-5270 | - |
dc.identifier.isi | WOS:000358193000002 | - |
dc.identifier.issnl | 1615-5262 | - |