Authors: Wenting Shen; Jia Yu; Rong Hao; Xuan Wang
Addresses: College of Computer Science and Technology, Qingdao University, Qingdao, 266071, China ' College of Computer Science and Technology, Qingdao University, Qingdao, 266071, China ' College of Computer Science and Technology, Qingdao University, Qingdao, 266071, China ' Key Laboratory of Information and Network Security, Engineering College of Chinese Armed Police Force, Xi'an, 710086, China
Abstract: Cloud storage is becoming more and more popular with the development of cloud computing technique. Cloud storage auditing, as one important security service, is used to check the integrity of the cloud data stored in cloud for users. However, the burden for users to generate authenticators is very huge before cloud data are outsourced to cloud in public cloud storage auditing, especially for resource-constrained clients. In order to deal with this problem, we propose a public cloud storage auditing scheme with lightweight authenticator generation. We design a new framework of public cloud storage auditing, in which an authenticators generation centre (AGC) is in charge of generating authenticators for users. In our proposed scheme, the AGC does not know the real cloud data of users because it only generates the authenticators for blinded cloud data. To reduce the computation burden at user side, the cloud can verify whether the authenticators generated by the AGC are correct or not. As a result, the users only consume very little computation for public authenticator generation and verification. In addition, our scheme can preserve data privacy and perform batch auditing. The security analysis and the performance analysis show the proposed scheme is secure and efficient.
Keywords: public cloud storage; privacy preservation; privacty protection; cloud data auditing; cloud security; cloud computing; resource-constrained clients; data privacy; batch auditing.
International Journal of High Performance Systems Architecture, 2016 Vol.6 No.3, pp.121 - 130
Available online: 27 Nov 2016 *Full-text access for editors Access for subscribers Purchase this article Comment on this article