Advanced Search
Volume 42 Issue 6
Jun.  2020
Turn off MathJax
Article Contents
Junfeng TIAN, Xuan JING. Shared Data Auditing Scheme for Efficient Revocation of Group Members via Multi-participation[J]. Journal of Electronics & Information Technology, 2020, 42(6): 1534-1541. doi: 10.11999/JEIT190468
Citation: Junfeng TIAN, Xuan JING. Shared Data Auditing Scheme for Efficient Revocation of Group Members via Multi-participation[J]. Journal of Electronics & Information Technology, 2020, 42(6): 1534-1541. doi: 10.11999/JEIT190468

Shared Data Auditing Scheme for Efficient Revocation of Group Members via Multi-participation

doi: 10.11999/JEIT190468
Funds:  The National Natural Science Foundation of China (61802106)
  • Received Date: 2019-06-24
  • Rev Recd Date: 2019-12-30
  • Available Online: 2020-01-11
  • Publish Date: 2020-06-22
  • In the view of the integrity verification problem of data sharing on the cloud platform, a Shared Data auditing scheme for efficient Revocation of group Members via multi-participation (SDRM) is proposed. First, through the Shamir secret sharing method, multiple group members participate in revoking the illegal group members, ensuring the equal rights between the group members. Second, this scheme combines with algebraic signature technology, the file identifier identifies the data owner’s upload data record and the normal group member’s access record, enabling the data owner to update efficiently all of its data. Finally, theoretical analysis and experimental verification of the correctness, safety and effectiveness of the scheme show that the scheme meets the requirement of efficient cancellation of group members, at the same time, as the number of data owners increases, the efficiency of updating data in this scheme is significantly higher than that of NPP.

  • loading
  • ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]. The 14th ACM Conference on Computer and Communications Security, Alexandria, USA, 2007: 598–609. doi: 10.1145/1315245.1315318.
    ATENIESE G, DI PIETRO R, MANCINI L V, et al. Scalable and efficient provable data possession[C]. The 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, 2008. doi: 10.1145/1460877.1460889.
    WANG Qian, WANG Cong, REN Kui, et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5): 847–859. doi: 10.1109/TPDS.2010.183
    BONEH D and SHACHAM H. Group signatures with verifier-local revocation[C]. The 11th ACM Conference on Computer and Communications Security, Washington, USA, 2004: 168–177. doi: 10.1145/1030083.1030106.
    WANG Boyang, LI Baochun, and LI Hui. Oruta: Privacy-preserving public auditing for shared data in the cloud[C]. The 5th IEEE International Conference on Cloud Computing, Honolulu, USA, 2012: 295–302. doi: 10.1109/CLOUD.2012.46.
    WORKU S G, XU Chunxiang, ZHAO Jining, et al. Secure and efficient privacy-preserving public auditing scheme for cloud storage[J]. Computers & Electrical Engineering, 2014, 40(5): 1703–1713. doi: 10.1016/j.compeleceng.2013.10.004
    SHEN Wenting, YU Jia, XIA Hui, et al. Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium[J]. Journal of Network and Computer Applications, 2017, 82: 56–64. doi: 10.1016/j.jnca.2017.01.015
    黄龙霞, 张功萱, 付安民. 基于层次树的动态群组隐私保护公开审计方案[J]. 计算机研究与发展, 2016, 53(10): 2334–2342. doi: 10.7544/issn1000-1239.2016.20160429

    HUANG Longxia, ZHANG Gongxuan, and FU Anmin. Privacy-preserving public auditing for dynamic group based on hierarchical tree[J]. Journal of Computer Research and Development, 2016, 53(10): 2334–2342. doi: 10.7544/issn1000-1239.2016.20160429
    HUANG Longxia, ZHANG Gongxuan, and FU Anmin. Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group[C]. Australasian Computer Science Week Multiconference, Geelong, Australia, 2017: 761–766. doi: 10.1145/3014812.3014890.
    PLANTARD T, SUSILO W, and ZHANG Zhenfei. Fully homomorphic encryption using hidden ideal lattice[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(12): 2127–2137. doi: 10.1109/TIFS.2013.2287732
    WANG Boyang, LI Baochun, and LI Hui. Panda: Public auditing for shared data with efficient user revocation in the cloud[J]. IEEE Transactions on Services Computing, 2015, 8(1): 92–106. doi: 10.1109/TSC.2013.2295611
    YUAN Jiawei and YU Shucheng. Efficient public integrity checking for cloud data sharing with multi-user modification[C]. 2014 IEEE Conference on Computer Communications, Toronto, Canada, 2014: 2121–2129. doi: 10.1109/infocom.2014.6848154.
    LUO Yuchuan, XU Ming, HUANG Kai, et al. Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing[J]. Computers & Security, 2018, 73: 492–506. doi: 10.1016/j.cose.2017.12.004
    JIANG Tao, CHEN Xiaofeng, and MA Jianfeng. Public integrity auditing for shared dynamic cloud data with group user revocation[J]. IEEE Transactions on Computers, 2016, 65(8): 2363–2373. doi: 10.1109/TC.2015.2389955
    ZHAGN Yue, YU Jia, HAO Rong, et al. Enabling efficient user revocation in identity-based cloud storage auditing for shared big data[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 17(3): 608–619. doi: 10.1109/TDSC.2018.2829880
    FU Anmin, YU Shui, ZHANG Yuqing, et al. NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users[J]. IEEE Transactions on Big Data, To be published. doi: 10.1109/TBDATA.2017.2701347
    SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612–613. doi: 10.1145/359168.359176
    SCHWARZ T S J S and MILLER E L. Store, forget, and check: Using algebraic signatures to check remotely administered storage[C]. The 26th IEEE International Conference on Distributed Computing Systems, Lisboa, Portugal, 2006: 12. doi: 10.1109/ICDCS.2006.80.
    LI Yannan, YU Yong, MIN Geyong, et al. Fuzzy identity-based data integrity auditing for reliable cloud storage systems[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 16(1): 72–83. doi: 10.1109/TDSC.2017.2662216
    田俊峰, 李天乐. 基于TPA云联盟的数据完整性验证模型[J]. 通信学报, 2018, 39(8): 113–124. doi: 10.11959/j.issn.1000-436x.2018144

    TIAN Junfeng and LI Tianle. Data integrity verification based on model cloud federation of TPA[J]. Journal on Communications, 2018, 39(8): 113–124. doi: 10.11959/j.issn.1000-436x.2018144
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)  / Tables(1)

    Article Metrics

    Article views (3337) PDF downloads(69) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return