Integrity Audit of Shared Cloud Data with Identity Tracking
More and more users are uploading their data to the cloud without storing any copies locally. Under the premise that cloud users cannot fully trust cloud service providers, how to ensure the integrity of users’ shared data in the cloud storage environment is one of the current research hotspots. In...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2019-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2019/1354346 |
id |
doaj-ac6e2b97d6b04bff98801c73cc6be0ff |
---|---|
record_format |
Article |
spelling |
doaj-ac6e2b97d6b04bff98801c73cc6be0ff2020-11-24T22:07:24ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222019-01-01201910.1155/2019/13543461354346Integrity Audit of Shared Cloud Data with Identity TrackingYun Xue Yan0Lei Wu1Wen Yu Xu2Hao Wang3Zhao Man Liu4School of Information Science and Engineering, Shandong Normal University, Jinan, ChinaSchool of Information Science and Engineering, Shandong Normal University, Jinan, ChinaSchool of Information Science and Engineering, Shandong Normal University, Jinan, ChinaSchool of Information Science and Engineering, Shandong Normal University, Jinan, ChinaSchool of Information Science and Engineering, Shandong Normal University, Jinan, ChinaMore and more users are uploading their data to the cloud without storing any copies locally. Under the premise that cloud users cannot fully trust cloud service providers, how to ensure the integrity of users’ shared data in the cloud storage environment is one of the current research hotspots. In this paper, we propose a secure and effective data sharing scheme for dynamic user groups. (1) In order to realize the user identity tracking and the addition and deletion of dynamic group users, we add a new role called Rights Distribution Center (RDC) in our scheme. (2) To protect the privacy of user identity, when performing third party audit to verify data integrity, it is not possible to determine which user is a specific user. Therefore, the fairness of the audit can be promoted. (3) Define a new integrity audit model for shared cloud data. In this scheme, the user sends the encrypted data to the cloud and the data tag to the Rights Distribution Center (RDC) by using data blindness technology. Finally, we prove the security of the scheme through provable security theory. In addition, the experimental data shows that our proposed scheme is more efficient and scalable than the state-of-the-art solution.http://dx.doi.org/10.1155/2019/1354346 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yun Xue Yan Lei Wu Wen Yu Xu Hao Wang Zhao Man Liu |
spellingShingle |
Yun Xue Yan Lei Wu Wen Yu Xu Hao Wang Zhao Man Liu Integrity Audit of Shared Cloud Data with Identity Tracking Security and Communication Networks |
author_facet |
Yun Xue Yan Lei Wu Wen Yu Xu Hao Wang Zhao Man Liu |
author_sort |
Yun Xue Yan |
title |
Integrity Audit of Shared Cloud Data with Identity Tracking |
title_short |
Integrity Audit of Shared Cloud Data with Identity Tracking |
title_full |
Integrity Audit of Shared Cloud Data with Identity Tracking |
title_fullStr |
Integrity Audit of Shared Cloud Data with Identity Tracking |
title_full_unstemmed |
Integrity Audit of Shared Cloud Data with Identity Tracking |
title_sort |
integrity audit of shared cloud data with identity tracking |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2019-01-01 |
description |
More and more users are uploading their data to the cloud without storing any copies locally. Under the premise that cloud users cannot fully trust cloud service providers, how to ensure the integrity of users’ shared data in the cloud storage environment is one of the current research hotspots. In this paper, we propose a secure and effective data sharing scheme for dynamic user groups. (1) In order to realize the user identity tracking and the addition and deletion of dynamic group users, we add a new role called Rights Distribution Center (RDC) in our scheme. (2) To protect the privacy of user identity, when performing third party audit to verify data integrity, it is not possible to determine which user is a specific user. Therefore, the fairness of the audit can be promoted. (3) Define a new integrity audit model for shared cloud data. In this scheme, the user sends the encrypted data to the cloud and the data tag to the Rights Distribution Center (RDC) by using data blindness technology. Finally, we prove the security of the scheme through provable security theory. In addition, the experimental data shows that our proposed scheme is more efficient and scalable than the state-of-the-art solution. |
url |
http://dx.doi.org/10.1155/2019/1354346 |
work_keys_str_mv |
AT yunxueyan integrityauditofsharedclouddatawithidentitytracking AT leiwu integrityauditofsharedclouddatawithidentitytracking AT wenyuxu integrityauditofsharedclouddatawithidentitytracking AT haowang integrityauditofsharedclouddatawithidentitytracking AT zhaomanliu integrityauditofsharedclouddatawithidentitytracking |
_version_ |
1725820676458151936 |