Citation: | Junfeng TIAN, Xuan JING. Shared Data Auditing Scheme for Efficient Revocation of Group Members via Multi-participation[J]. Journal of Electronics & Information Technology, 2020, 42(6): 1534-1541. doi: 10.11999/JEIT190468 |
In the view of the integrity verification problem of data sharing on the cloud platform, a Shared Data auditing scheme for efficient Revocation of group Members via multi-participation (SDRM) is proposed. First, through the Shamir secret sharing method, multiple group members participate in revoking the illegal group members, ensuring the equal rights between the group members. Second, this scheme combines with algebraic signature technology, the file identifier identifies the data owner’s upload data record and the normal group member’s access record, enabling the data owner to update efficiently all of its data. Finally, theoretical analysis and experimental verification of the correctness, safety and effectiveness of the scheme show that the scheme meets the requirement of efficient cancellation of group members, at the same time, as the number of data owners increases, the efficiency of updating data in this scheme is significantly higher than that of NPP.
ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]. The 14th ACM Conference on Computer and Communications Security, Alexandria, USA, 2007: 598–609. doi: 10.1145/1315245.1315318.
|
ATENIESE G, DI PIETRO R, MANCINI L V, et al. Scalable and efficient provable data possession[C]. The 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, 2008. doi: 10.1145/1460877.1460889.
|
WANG Qian, WANG Cong, REN Kui, et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5): 847–859. doi: 10.1109/TPDS.2010.183
|
BONEH D and SHACHAM H. Group signatures with verifier-local revocation[C]. The 11th ACM Conference on Computer and Communications Security, Washington, USA, 2004: 168–177. doi: 10.1145/1030083.1030106.
|
WANG Boyang, LI Baochun, and LI Hui. Oruta: Privacy-preserving public auditing for shared data in the cloud[C]. The 5th IEEE International Conference on Cloud Computing, Honolulu, USA, 2012: 295–302. doi: 10.1109/CLOUD.2012.46.
|
WORKU S G, XU Chunxiang, ZHAO Jining, et al. Secure and efficient privacy-preserving public auditing scheme for cloud storage[J]. Computers & Electrical Engineering, 2014, 40(5): 1703–1713. doi: 10.1016/j.compeleceng.2013.10.004
|
SHEN Wenting, YU Jia, XIA Hui, et al. Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium[J]. Journal of Network and Computer Applications, 2017, 82: 56–64. doi: 10.1016/j.jnca.2017.01.015
|
黄龙霞, 张功萱, 付安民. 基于层次树的动态群组隐私保护公开审计方案[J]. 计算机研究与发展, 2016, 53(10): 2334–2342. doi: 10.7544/issn1000-1239.2016.20160429
HUANG Longxia, ZHANG Gongxuan, and FU Anmin. Privacy-preserving public auditing for dynamic group based on hierarchical tree[J]. Journal of Computer Research and Development, 2016, 53(10): 2334–2342. doi: 10.7544/issn1000-1239.2016.20160429
|
HUANG Longxia, ZHANG Gongxuan, and FU Anmin. Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group[C]. Australasian Computer Science Week Multiconference, Geelong, Australia, 2017: 761–766. doi: 10.1145/3014812.3014890.
|
PLANTARD T, SUSILO W, and ZHANG Zhenfei. Fully homomorphic encryption using hidden ideal lattice[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(12): 2127–2137. doi: 10.1109/TIFS.2013.2287732
|
WANG Boyang, LI Baochun, and LI Hui. Panda: Public auditing for shared data with efficient user revocation in the cloud[J]. IEEE Transactions on Services Computing, 2015, 8(1): 92–106. doi: 10.1109/TSC.2013.2295611
|
YUAN Jiawei and YU Shucheng. Efficient public integrity checking for cloud data sharing with multi-user modification[C]. 2014 IEEE Conference on Computer Communications, Toronto, Canada, 2014: 2121–2129. doi: 10.1109/infocom.2014.6848154.
|
LUO Yuchuan, XU Ming, HUANG Kai, et al. Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing[J]. Computers & Security, 2018, 73: 492–506. doi: 10.1016/j.cose.2017.12.004
|
JIANG Tao, CHEN Xiaofeng, and MA Jianfeng. Public integrity auditing for shared dynamic cloud data with group user revocation[J]. IEEE Transactions on Computers, 2016, 65(8): 2363–2373. doi: 10.1109/TC.2015.2389955
|
ZHAGN Yue, YU Jia, HAO Rong, et al. Enabling efficient user revocation in identity-based cloud storage auditing for shared big data[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 17(3): 608–619. doi: 10.1109/TDSC.2018.2829880
|
FU Anmin, YU Shui, ZHANG Yuqing, et al. NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users[J]. IEEE Transactions on Big Data, To be published. doi: 10.1109/TBDATA.2017.2701347
|
SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612–613. doi: 10.1145/359168.359176
|
SCHWARZ T S J S and MILLER E L. Store, forget, and check: Using algebraic signatures to check remotely administered storage[C]. The 26th IEEE International Conference on Distributed Computing Systems, Lisboa, Portugal, 2006: 12. doi: 10.1109/ICDCS.2006.80.
|
LI Yannan, YU Yong, MIN Geyong, et al. Fuzzy identity-based data integrity auditing for reliable cloud storage systems[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 16(1): 72–83. doi: 10.1109/TDSC.2017.2662216
|
田俊峰, 李天乐. 基于TPA云联盟的数据完整性验证模型[J]. 通信学报, 2018, 39(8): 113–124. doi: 10.11959/j.issn.1000-436x.2018144
TIAN Junfeng and LI Tianle. Data integrity verification based on model cloud federation of TPA[J]. Journal on Communications, 2018, 39(8): 113–124. doi: 10.11959/j.issn.1000-436x.2018144
|