Integrity Audit of Shared Cloud Data with Identity Tracking

More and more users are uploading their data to the cloud without storing any copies locally. Under the premise that cloud users cannot fully trust cloud service providers, how to ensure the integrity of users’ shared data in the cloud storage environment is one of the current research hotspots. In...

Full description

Bibliographic Details
Main Authors: Yun Xue Yan, Lei Wu, Wen Yu Xu, Hao Wang, Zhao Man Liu
Format: Article
Language:English
Published: Hindawi-Wiley 2019-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2019/1354346
id doaj-ac6e2b97d6b04bff98801c73cc6be0ff
record_format Article
spelling doaj-ac6e2b97d6b04bff98801c73cc6be0ff2020-11-24T22:07:24ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222019-01-01201910.1155/2019/13543461354346Integrity Audit of Shared Cloud Data with Identity TrackingYun Xue Yan0Lei Wu1Wen Yu Xu2Hao Wang3Zhao Man Liu4School of Information Science and Engineering, Shandong Normal University, Jinan, ChinaSchool of Information Science and Engineering, Shandong Normal University, Jinan, ChinaSchool of Information Science and Engineering, Shandong Normal University, Jinan, ChinaSchool of Information Science and Engineering, Shandong Normal University, Jinan, ChinaSchool of Information Science and Engineering, Shandong Normal University, Jinan, ChinaMore and more users are uploading their data to the cloud without storing any copies locally. Under the premise that cloud users cannot fully trust cloud service providers, how to ensure the integrity of users’ shared data in the cloud storage environment is one of the current research hotspots. In this paper, we propose a secure and effective data sharing scheme for dynamic user groups. (1) In order to realize the user identity tracking and the addition and deletion of dynamic group users, we add a new role called Rights Distribution Center (RDC) in our scheme. (2) To protect the privacy of user identity, when performing third party audit to verify data integrity, it is not possible to determine which user is a specific user. Therefore, the fairness of the audit can be promoted. (3) Define a new integrity audit model for shared cloud data. In this scheme, the user sends the encrypted data to the cloud and the data tag to the Rights Distribution Center (RDC) by using data blindness technology. Finally, we prove the security of the scheme through provable security theory. In addition, the experimental data shows that our proposed scheme is more efficient and scalable than the state-of-the-art solution.http://dx.doi.org/10.1155/2019/1354346
collection DOAJ
language English
format Article
sources DOAJ
author Yun Xue Yan
Lei Wu
Wen Yu Xu
Hao Wang
Zhao Man Liu
spellingShingle Yun Xue Yan
Lei Wu
Wen Yu Xu
Hao Wang
Zhao Man Liu
Integrity Audit of Shared Cloud Data with Identity Tracking
Security and Communication Networks
author_facet Yun Xue Yan
Lei Wu
Wen Yu Xu
Hao Wang
Zhao Man Liu
author_sort Yun Xue Yan
title Integrity Audit of Shared Cloud Data with Identity Tracking
title_short Integrity Audit of Shared Cloud Data with Identity Tracking
title_full Integrity Audit of Shared Cloud Data with Identity Tracking
title_fullStr Integrity Audit of Shared Cloud Data with Identity Tracking
title_full_unstemmed Integrity Audit of Shared Cloud Data with Identity Tracking
title_sort integrity audit of shared cloud data with identity tracking
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2019-01-01
description More and more users are uploading their data to the cloud without storing any copies locally. Under the premise that cloud users cannot fully trust cloud service providers, how to ensure the integrity of users’ shared data in the cloud storage environment is one of the current research hotspots. In this paper, we propose a secure and effective data sharing scheme for dynamic user groups. (1) In order to realize the user identity tracking and the addition and deletion of dynamic group users, we add a new role called Rights Distribution Center (RDC) in our scheme. (2) To protect the privacy of user identity, when performing third party audit to verify data integrity, it is not possible to determine which user is a specific user. Therefore, the fairness of the audit can be promoted. (3) Define a new integrity audit model for shared cloud data. In this scheme, the user sends the encrypted data to the cloud and the data tag to the Rights Distribution Center (RDC) by using data blindness technology. Finally, we prove the security of the scheme through provable security theory. In addition, the experimental data shows that our proposed scheme is more efficient and scalable than the state-of-the-art solution.
url http://dx.doi.org/10.1155/2019/1354346
work_keys_str_mv AT yunxueyan integrityauditofsharedclouddatawithidentitytracking
AT leiwu integrityauditofsharedclouddatawithidentitytracking
AT wenyuxu integrityauditofsharedclouddatawithidentitytracking
AT haowang integrityauditofsharedclouddatawithidentitytracking
AT zhaomanliu integrityauditofsharedclouddatawithidentitytracking
_version_ 1725820676458151936