Cloud data auditing with designated verifier

Solomon Guadie WORKU, Chunxiang XU, Jining ZHAO

PDF(362 KB)
PDF(362 KB)
Front. Comput. Sci. ›› 2014, Vol. 8 ›› Issue (3) : 503-512. DOI: 10.1007/s11704-013-3138-7
RESEARCH ARTICLE

Cloud data auditing with designated verifier

Author information +
History +

Abstract

An auditing scheme is a good way to prove owner’s data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build for the last few years. However, in a public auditing scheme everybody does verification of data and a possibility of leaking some secrete information to the public verifiers is an issue that data owners are unhappy with this scenario. For example, the data owner does not want anybody else to know he has the data stored in the cloud server. Motivated by the issue of privacy associated with public auditing system, we proposed a designated verifier auditing (DVA) scheme based on Steinfeld et al.’s universal designated verifier (DV) signature scheme. Our DVA scheme authorizes a third party auditor with private verification capability. It provides private verification because the scheme involves private key of the verifier. Moreover, we present the batch auditing scheme to improve auditing efficiency. Through rigorous security analysis we showed that our scheme is provably secure in the random oraclemodel assuming that the computational Diffie-Hellman (CDH) problem is hard over the group of bilinear maps.

Keywords

cloud data storage / designated verifier / data privacy / storage correctness / cloud computing

Cite this article

Download citation ▾
Solomon Guadie WORKU, Chunxiang XU, Jining ZHAO. Cloud data auditing with designated verifier. Front. Comput. Sci., 2014, 8(3): 503‒512 https://doi.org/10.1007/s11704-013-3138-7

References

[1]
AsaarM R, SalmasizadehM. A pairing based strong designated veri-fier signature scheme without random oracles. IACR cryptology eprint archive, 2012
[2]
GorantlaM C, BoydC, NietoJ M G. Strong designated verifier signature in a multi-user setting. In: Proceedings of the 7th Australasian Conference on Information Security. 2009, 21-31
[3]
HuangQ, YangG, WongD S, SusiloW. Efficient strong designated verifier signature schemes without random oracle or with nondelegatability. International Journal of Information Security, 2011, 10(6): 373-385
CrossRef Google scholar
[4]
HuangX, SusiloW, MuY, WuW. Secure universal designated verifier signature without random oracles. International Journal of Information Security, 2008, 7(3): 171-183
CrossRef Google scholar
[5]
HuangX, SusiloW, MuY, ZhangF. Short designated verifier signature scheme and its identity-based variant. International Journal of Network Security, 2008, 6(1): 82-93
[6]
SteinfeldR, BullL, WangH, PieprzykJ. Universal designated-verifier signatures. In: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security. 2003, 523-542
[7]
JuelsA, KaliskiJr B S. PORS: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007, 584-597
CrossRef Google scholar
[8]
AtenieseG, BurnsR, CurtmolaR, HerringJ, KissnerL, PetersonZ, SongD. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007, 598-609
CrossRef Google scholar
[9]
AtenieseG, Di PietroR, ManciniL V, TsudikG. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. 2008, Article 9
CrossRef Google scholar
[10]
ShachamH, WatersB. Compact proofs of retrievability. In: Advances in Cryptology-ASIACRYPT 2008. 2008, 90-107
[11]
BonehD, LynnB, ShachamH. Short signatures from the weil pairing. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. 2001, 514-532
[12]
WangQ, WangC, LiJ, RenK, LouW. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security. 2009, 355-370
[13]
WangC, WangQ, RenK, LouW. Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the 2010 IEEE INFOCOM. 2010, 1-9
[14]
XuC, HeX, Abraha-WeldemariamD. Cryptanalysis of wang’s auditing protocol for data storage security in cloud computing. In: Proceedings of the 4th International Conference on Information Computing and Applications. 2012, 422-428
CrossRef Google scholar
[15]
WangC, ChowS S, WangQ, RenK, LouW. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 2011, 1-12
[16]
WangC, ChowS S, WangQ, RenK, LouW. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 2013, 62(2): 362-375
CrossRef Google scholar
[17]
BonehD, GentryC, LynnB, ShachamH. Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques. 2003, 416-432

RIGHTS & PERMISSIONS

2014 Higher Education Press and Springer-Verlag Berlin Heidelberg
AI Summary AI Mindmap
PDF(362 KB)

Accesses

Citations

Detail

Sections
Recommended

/