We believe that sharing data among multiple users is perhaps one of the most engaging features that motivates cloud storage. A unique problem introduced during the process of public auditing for shared data in the cloud is how to preserve identity privacy from the TPA, because the identities of signers on shared data may indicate that a particular user in the group or a special block in shared data is a higher valuable target than others. Abstract—With cloud storage services, it is common place for data to be not only stored in the cloud, but also shared across multiple users. However, public auditing for such shared data — while preserving identity privacy— remains to be an open challenge. In this paper, we propose the first privacy-preserving mechanism that allows public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute the verification information needed to audit the integrity of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from a third party auditor (TPA), who is still able to publicly verify the integrity of shared data without retrieving the entire file. Our experimental results demonstrate the effectiveness and efficiency of our proposed mechanism when auditing shared data. mechanism for cloud data, so that during public auditing, the content of private data belonging to a personal user is not disclosed to the third party auditor.
[1]
Cong Wang,et al.
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
,
2010,
2010 Proceedings IEEE INFOCOM.
[2]
Dan Boneh,et al.
Homomorphic Signatures for Polynomial Functions
,
2011,
EUROCRYPT.
[3]
Reza Curtmola,et al.
Provable data possession at untrusted stores
,
2007,
CCS '07.
[4]
Yael Tauman Kalai,et al.
How to Leak a Secret: Theory and Applications of Ring Signatures
,
2001,
Essays in Memory of Shimon Even.
[5]
Yogitha Lakshmi,et al.
Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
,
2015
.
[6]
Matthew Green,et al.
Practical Short Signature Batch Verification
,
2009,
CT-RSA.
[7]
Cong Wang,et al.
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
,
2010,
2010 Proceedings IEEE INFOCOM.