Securing Shared Data Integrity in Cloud Storage with User Revocation (original) (raw)
Related papers
A mechanism of user revocation based public auditing for shared data in the cloud
2015
Cloud mechanism is the most popular emerging technology which satisfies various technical adequacies. The main usage of the cloud environment is sharing resource and now-a-day's security threats and data confidentiality are most disused issues in the cloud environment. In the cloud environment certain members can able to form a group and access the information by sharing. To make the process efficient and secured the data integrity is verified publicly, for this every user needs to compute their signature on each block. For security reason if a user revoked from the group and the remaining user in the group has to resign the signature on all blocks. But this mechanism is inefficient and more complex in dealing with the large amount data stored in the cloud. In order to over these drawbacks we proposed a novel architecture of public auditing mechanism for maintaining the integrity of shared data by means of efficient user revocation in mind. By means of keeping a public auditing,...
USER REVOCATION WITH PUBLIC AUDITING FOR SECURE CLOUD DATA SHARING
NOVATEUR PUBLICATIONS, 2021
Cloud storage auditing refers to the verification of exactness of shared data in cloud. Different users from different groups share different data in cloud. Privacy protection becomes the biggest question mark in cloud's data services. To ensure perfection of the cloud data and for efficient user revocation, Third Party Auditing is to be done with novel Collusion Resistant Proxy Re-signature Scheme. When a user gets revocated, the cloud is much able to resign the data chunks; these data chunks were already acknowledged by the repudiated user. But, now the cloud re-stamps with a resigning key, and this process enhances the potency of the system. Moreover, Auditing has to be done over shared data which heightens the reliability of cloud data.
Securing Shared Data in Public Cloud with User Revocation
2017
With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure share data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straight forward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
The advent of the cloud computing makes storage outsourcing becomes a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature. Recently some researches consider the problem of secure and efficient public data integrity auditing for shared dynamic data. However, these schemes are still not secure against the collusion of cloud storage server and revoked group users during user revocation in practical cloud storage system. In this paper, we figure out the collusion attack in the exiting scheme and provide an efficient public integrity auditing scheme with secure group user revocation based on vector commitment and verifier-local revocation group signature. We design a concrete scheme based on our scheme definition. Our scheme supports the public checking and efficient user revocation and also some nice properties, such as confidently, efficiency, countability and traceability of secure group user revocation. Finally, the security and experimental analysis show that compared with its relevant schemes our scheme is also secure and efficient.
2014
The term cloud computing has been emerged as a computing network over the Internet. Cloud data indulge storing of the data in the cloud as well as has sharing capability among multiple users. Due to failures of human or hardware and even Software errors cloud data is associated with data integrity. Several mechanisms have been proposed in order to allow both the data owners as well as the public auditors to audit cloud data integrity efficiently without retrieving the entire data from the cloud servers. A Third Party Auditor (TPA) will perform integrity checking and the identity of the signer on each block in shared data is kept private from them. In this paper, we only survey for auditing the integrity of shared data in the cloud with efficient user revocation while still conserving identity privacy.
—With cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. However, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information — identity privacy — to public verifiers. In this paper, we propose a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. In addition, our mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. Our experimental results demonstrate the effectiveness and efficiency of our mechanism when auditing shared data integrity.
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
In cloud computing, many mechanisms have been proposed to allow not only a data owner itself but also a public verifier to efficiently perform integrity checking without downloading the entire data from the cloud, which is referred to as public auditing. In these mechanisms, data is divided into many small blocks, where each block is independently signed by the owner; and a random combination of all the blocks instead of the whole data is retrieved during integrity checking .However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. Here, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing.