CRUPA: collusion resistant user revocable public auditing of shared data in cloud

Author:

Mara Geeta C.,Rathod Usharani,R. G. Shreyas Raju,S. Raghavendra,Buyya Rajkumar,R. Venugopal K.,Iyengar S. S.,Patnaik L. M.

Abstract

AbstractCloud repository is one of the most important services afforded by Cloud Computing where information is preserved, maintained, archived in distant servers and made available to the users over the Internet. Provided with the cloud repository facilities, customers can organize themselves as a cluster and distribute information with one another. In order to allow public integrity auditing on the information stored in semi-trusted cloud server, customers compute the signatures for every chunk of the shared information. When a malicious client is repudiated from the group, the chunks that were outsourced to the cloud server by this renounced customer need to be verified and re-signed by the customer present in the cluster (i.e., the straightforward approach) which results in huge transmission and reckoning cost for the customer. In order to minimize the burden of customers present in the cluster, in the existing scheme Panda, the semi-trusted Cloud Service Provider (CSP) is allowed to compute the Resign key. Further, the CSP audits and re-signs the revoked customer chunks by utilizing the Resign key. So, it is easy for the CSP by colluding with the revoked customer to find the secret keys of the existing customer. We introduce a novel Collusion Resistant User Revocable Public Auditing of Shared Data in Cloud (CRUPA) by making use of the concept of regression technique. In order to secure the secret keys of the existing customers from the CSP, we have allowed the information proprietor to compute the Resign key using the regression technique. Whenever the information proprietor revokes the customer from the cluster, the information proprietor computes the Resign key using the regression technique and sends to the CSP. Further, the CSP audits and re-signs the revoked customer chunks using the Resign key. The Resign key computed by the information proprietor using regression method is highly secure and the malicious CSP cannot find the private information of the customers in the cluster. Besides, our mechanism achieves significant improvement in the computation cost of the Resign key by information proprietor. Further, the proposed scheme is collusion resistant, supports effective and secure customer repudiation, multi-information proprietor batch auditing and is scalable.

Publisher

Springer Science and Business Media LLC

Subject

Computer Networks and Communications,Software

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. An adaptive routing strategy in P2P-based Edge Cloud;Journal of Cloud Computing;2024-01-10

2. The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR);Computational Intelligence and Neuroscience;2022-06-07

3. Support Efficient User Revocation and Identity Privacy in Integrity Auditing of Shared Data;2022 7th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA);2022-04-22

4. Secure Shared Data in the Private Cloud With an EA Algorithm;2022 8th International Conference on Smart Structures and Systems (ICSSS);2022-04-21

5. Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation;IEEE Access;2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3