Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

邮发代号 80-970

2019 Impact Factor: 1.275

Frontiers of Computer Science  2014, Vol. 8 Issue (3): 503-512   https://doi.org/10.1007/s11704-013-3138-7
  本期目录
Cloud data auditing with designated verifier
Solomon Guadie WORKU,Chunxiang XU(),Jining ZHAO
School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
 全文: PDF(362 KB)  
Abstract

An auditing scheme is a good way to prove owner’s data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build for the last few years. However, in a public auditing scheme everybody does verification of data and a possibility of leaking some secrete information to the public verifiers is an issue that data owners are unhappy with this scenario. For example, the data owner does not want anybody else to know he has the data stored in the cloud server. Motivated by the issue of privacy associated with public auditing system, we proposed a designated verifier auditing (DVA) scheme based on Steinfeld et al.’s universal designated verifier (DV) signature scheme. Our DVA scheme authorizes a third party auditor with private verification capability. It provides private verification because the scheme involves private key of the verifier. Moreover, we present the batch auditing scheme to improve auditing efficiency. Through rigorous security analysis we showed that our scheme is provably secure in the random oraclemodel assuming that the computational Diffie-Hellman (CDH) problem is hard over the group of bilinear maps.

Key wordscloud data storage    designated verifier    data privacy    storage correctness    cloud computing
收稿日期: 2013-04-20      出版日期: 2014-06-24
Corresponding Author(s): Chunxiang XU   
 引用本文:   
. [J]. Frontiers of Computer Science, 2014, 8(3): 503-512.
Solomon Guadie WORKU,Chunxiang XU,Jining ZHAO. Cloud data auditing with designated verifier. Front. Comput. Sci., 2014, 8(3): 503-512.
 链接本文:  
https://academic.hep.com.cn/fcs/CN/10.1007/s11704-013-3138-7
https://academic.hep.com.cn/fcs/CN/Y2014/V8/I3/503
1 AsaarM R, SalmasizadehM. A pairing based strong designated veri-fier signature scheme without random oracles. IACR cryptology eprint archive, 2012
2 GorantlaM C, BoydC, NietoJ M G. Strong designated verifier signature in a multi-user setting. In: Proceedings of the 7th Australasian Conference on Information Security. 2009, 21-31
3 HuangQ, YangG, WongD S, SusiloW. Efficient strong designated verifier signature schemes without random oracle or with nondelegatability. International Journal of Information Security, 2011, 10(6): 373-385
doi: 10.1007/s10207-011-0146-1
4 HuangX, SusiloW, MuY, WuW. Secure universal designated verifier signature without random oracles. International Journal of Information Security, 2008, 7(3): 171-183
doi: 10.1007/s10207-007-0021-2
5 HuangX, SusiloW, MuY, ZhangF. Short designated verifier signature scheme and its identity-based variant. International Journal of Network Security, 2008, 6(1): 82-93
6 SteinfeldR, BullL, WangH, PieprzykJ. Universal designated-verifier signatures. In: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security. 2003, 523-542
7 JuelsA, KaliskiJr B S. PORS: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007, 584-597
doi: 10.1145/1315245.1315317
8 AtenieseG, BurnsR, CurtmolaR, HerringJ, KissnerL, PetersonZ, SongD. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007, 598-609
doi: 10.1145/1315245.1315318
9 AtenieseG, Di PietroR, ManciniL V, TsudikG. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. 2008, Article 9
doi: 10.1145/1460877.1460889
10 ShachamH, WatersB. Compact proofs of retrievability. In: Advances in Cryptology-ASIACRYPT 2008. 2008, 90-107
11 BonehD, LynnB, ShachamH. Short signatures from the weil pairing. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. 2001, 514-532
12 WangQ, WangC, LiJ, RenK, LouW. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security. 2009, 355-370
13 WangC, WangQ, RenK, LouW. Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the 2010 IEEE INFOCOM. 2010, 1-9
14 XuC, HeX, Abraha-WeldemariamD. Cryptanalysis of wang’s auditing protocol for data storage security in cloud computing. In: Proceedings of the 4th International Conference on Information Computing and Applications. 2012, 422-428
doi: 10.1007/978-3-642-34041-3_59
15 WangC, ChowS S, WangQ, RenK, LouW. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 2011, 1-12
16 WangC, ChowS S, WangQ, RenK, LouW. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 2013, 62(2): 362-375
doi: 10.1109/TC.2011.245
17 BonehD, GentryC, LynnB, ShachamH. Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques. 2003, 416-432
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed