Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System

Cloud storage provides an inexpensive and effective means for the storage and management of images, which in turn occupy a huge proportion and are usually stored in an archived mode. Considering the security and efficiency requirements of cloud images, an efficient real-time integrity audit scheme is in urgent need. However, existing solutions cannot be directly applied since they do not take the characteristics of cloud images into account and thus take enormous computations, communications, and storage to generate, transfer, and store authentication data. Moreover, the result of auditing cannot be used as evidence to prove the guilt of cloud service provider since the verifier whom is specified by the client may hide its misbehavior. Reversible watermarking is a potential way to achieve lightweight real-time audit for cloud images without introducing permanent distortion. Nevertheless, existing algorithms cannot provide stable capacity for authentication data of fixed length. In addition, it entails security problems once it is used to solve the fairness problem. This paper proposes an efficient real-time integrity audit scheme specific to cloud images with fair arbitration support. The scheme is based on the presented adaptive reversible watermarking algorithm which provides a fixed embedding capacity for images to embed authentication data. To address fairness problem under the proposed mechanism, we adopt Diffie–Hellman key exchange scheme to design a new challenge-response protocol under the established simplified consensus mechanism, so that replay attack resistance and privacy-preserving fair arbitration are achieved. The security analysis and performance evaluation show that the proposed scheme has provable security and greatly enhanced efficiency comparing with the state of the art.

[1]  Huaqun Wang,et al.  Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.

[2]  Ioan-Catalin Dragoi,et al.  Adaptive Pairing Reversible Watermarking , 2016, IEEE Transactions on Image Processing.

[3]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[4]  Balasubramanian Raman,et al.  Reversible data hiding based on Shamir's secret sharing for color images over cloud , 2018, Inf. Sci..

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Li Dong,et al.  Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  Jean-Jacques Quisquater,et al.  Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.

[8]  Dinu Coltuc,et al.  Improved Embedding for Prediction-Based Reversible Watermarking , 2011, IEEE Transactions on Information Forensics and Security.

[9]  Henk J. A. M. Heijmans,et al.  Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.

[10]  Jiankun Hu,et al.  Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage , 2019, IEEE Transactions on Information Forensics and Security.

[11]  Yining Qi,et al.  Fragile Watermarking Based Proofs of Retrievability for Archival Cloud Data , 2016, IWDW.

[12]  Jinjun Chen,et al.  MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud , 2015, IEEE Transactions on Computers.

[13]  Hyoung Joong Kim,et al.  Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[14]  Gio Wiederhold,et al.  Semantics-sensitive integrated matching for picture libraries and biomedical image databases , 2000 .

[15]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[16]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[17]  James Ze Wang,et al.  SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[18]  Hong Jiang,et al.  Dynamic and Public Auditing with Fair Arbitration for Cloud Data , 2018, IEEE Transactions on Cloud Computing.

[19]  Fucai Zhou,et al.  Identity-Based Public Multi-Replica Provable Data Possession , 2017, IEEE Access.

[20]  Gail-Joon Ahn,et al.  Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.

[21]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[22]  Jing Dong,et al.  Ensemble Reversible Data Hiding , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).

[23]  Gwan-Hwan Hwang,et al.  Efficient Real-Time Auditing and Proof of Violation for Cloud Storage Systems , 2016, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD).

[24]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[25]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[26]  Jin Liu,et al.  Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Services Computing.

[27]  G. Coatrieux,et al.  An additive and lossless watermarking method based on invariant image approximation and Haar wavelet transform , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[28]  Kyung-Hyune Rhee,et al.  Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage , 2018, IEEE Access.

[29]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[30]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[31]  Nora Cuppens-Boulahia,et al.  Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting , 2013, IEEE Transactions on Information Forensics and Security.

[32]  Yao Zhao,et al.  Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[33]  M. Mrinalni Vaknishadh,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .

[34]  Alptekin Kup,et al.  Official Arbitration with Secure Cloud Storage Application , 2013 .