Secure Logging and Public Audit for Operation Behavior in Cloud Storage

In cloud storage, auditing for operation behavior logs (OBLs) plays an increasingly important role in the field of cloud auditing. In this paper, we first introduce our third party auditing model for user's operation behavior. Further, a novel secure logging approach is proposed to ensure the OBLs security in cloud. Then, we present a secure public auditing scheme for OBLs. Specifically, BLS signature and random mask technique are used by third party auditor to verify the validity of OBLs in auditing process, by which our scheme achieves secure public privacy-preserving verification for OBLs. The experimental results show that our scheme provides secure and high efficiency in auditing performance.

[1]  Panayiotis Kotzanikolaou,et al.  A Framework for Secure and Verifiable Logging in Public Communication Networks , 2006, CRITIS.

[2]  Leonid Reyzin,et al.  A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.

[3]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[4]  Gene Tsudik,et al.  A new approach to secure logging , 2008, TOS.

[5]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[6]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[7]  Bruce Schneier,et al.  Secure audit logs to support computer forensics , 1999, TSEC.

[8]  Mihir Bellare,et al.  A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.

[9]  Shouhuai Xu,et al.  Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.

[10]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[11]  Jin Liu,et al.  Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Services Computing.

[12]  Peng Ning,et al.  Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging , 2012, Financial Cryptography.

[13]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[14]  Chin-Chen Chang,et al.  Enabling public auditability for operation behaviors in cloud storage , 2016, Soft Computing.

[15]  Ejaz Ahmed,et al.  A review on remote data auditing in single cloud server: Taxonomy and open issues , 2014, J. Netw. Comput. Appl..

[16]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[17]  Albert Y. Zomaya,et al.  Remote Data Auditing in Cloud Computing Environments , 2015, ACM Comput. Surv..

[18]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[19]  Rajkumar Buyya,et al.  Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..

[20]  Kent E. Seamons,et al.  Logcrypt: Forward Security and Public Verification for Secure Audit Logs , 2005, IACR Cryptol. ePrint Arch..

[21]  Christoph Wegener,et al.  Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[22]  Yong Yu,et al.  Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[23]  Mary Baker,et al.  Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..

[24]  Kim-Kwang Raymond Choo,et al.  An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..