Secure auditing and deduplication for encrypted cloud data supporting ownership modification

Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Soft computing (Berlin, Germany) Germany), 2020-08, Vol.24 (16), p.12197-12214
Hauptverfasser: Bai, Jianli, Yu, Jia, Gao, Xiang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 12214
container_issue 16
container_start_page 12197
container_title Soft computing (Berlin, Germany)
container_volume 24
creator Bai, Jianli
Yu, Jia
Gao, Xiang
description Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space by exploiting the duplication techniques. However, when a data owner deletes or modifies his outsourced data, he should lose the ownership for the original data and should not be able to successfully retrieve this data any more. For all we know, existing cloud storage auditing and deduplication literatures fail to support the modifications of ownership, which actually occur quite often in actual cloud storage scenarios. In this paper, we propose the first deduplicated data integrity auditing scheme supporting the ownership modification. It guarantees the integrity of the outsourced data and supports the dynamic access control over the outsourced data. We employ a re-encryption algorithm and the secure identity-based broadcast encryption technology, which prevent data from being disclosed to the revoked owners, even if they previously had prior ownership of these data. The security and efficiency of our proposed scheme have been validated by detailed analysis and experiments.
doi_str_mv 10.1007/s00500-019-04661-5
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2917906603</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2917906603</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-4123d9c7e6d58121e23653418e9b9bc0f1335affb2920404d916d850b154ea4f3</originalsourceid><addsrcrecordid>eNp9kMtKAzEUQIMoWKs_4CrgOnrznGYpxRcUXKg7IWTyqFPayZjMIP69Y6fgztW9i3PuhYPQJYVrClDdFAAJQIBqAkIpSuQRmlHBOalEpY_3OyOVEvwUnZWyAWC0knyG3l-CG3LAdvBN37RrbFuPffBDt22c7ZvU4pgyDq3L310fPHbbNIyE7S0uQ9elvLfSVxty-Wg6vEu-iQf1HJ1Euy3h4jDn6O3-7nX5SFbPD0_L2xVxnOqeCMq4164KyssFZTQwriQXdBF0rWsHkXIubYw10wwECK-p8gsJNZUiWBH5HF1Nd7ucPodQerNJQ27Hl4ZpWmlQCvhIsYlyOZWSQzRdbnY2fxsK5reimSqasaLZVzRylPgklRFu1yH_nf7H-gEcd3Wo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2917906603</pqid></control><display><type>article</type><title>Secure auditing and deduplication for encrypted cloud data supporting ownership modification</title><source>SpringerNature Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Bai, Jianli ; Yu, Jia ; Gao, Xiang</creator><creatorcontrib>Bai, Jianli ; Yu, Jia ; Gao, Xiang</creatorcontrib><description>Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space by exploiting the duplication techniques. However, when a data owner deletes or modifies his outsourced data, he should lose the ownership for the original data and should not be able to successfully retrieve this data any more. For all we know, existing cloud storage auditing and deduplication literatures fail to support the modifications of ownership, which actually occur quite often in actual cloud storage scenarios. In this paper, we propose the first deduplicated data integrity auditing scheme supporting the ownership modification. It guarantees the integrity of the outsourced data and supports the dynamic access control over the outsourced data. We employ a re-encryption algorithm and the secure identity-based broadcast encryption technology, which prevent data from being disclosed to the revoked owners, even if they previously had prior ownership of these data. The security and efficiency of our proposed scheme have been validated by detailed analysis and experiments.</description><identifier>ISSN: 1432-7643</identifier><identifier>EISSN: 1433-7479</identifier><identifier>DOI: 10.1007/s00500-019-04661-5</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Access control ; Algorithms ; Artificial Intelligence ; Cloud computing ; Computational Intelligence ; Control ; Data encryption ; Data integrity ; Design ; Encryption ; Engineering ; Integrity ; Mathematical Logic and Foundations ; Mechatronics ; Methodologies and Application ; Outsourcing ; Ownership ; Privacy ; Robotics ; Storage</subject><ispartof>Soft computing (Berlin, Germany), 2020-08, Vol.24 (16), p.12197-12214</ispartof><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2020</rights><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-4123d9c7e6d58121e23653418e9b9bc0f1335affb2920404d916d850b154ea4f3</citedby><cites>FETCH-LOGICAL-c319t-4123d9c7e6d58121e23653418e9b9bc0f1335affb2920404d916d850b154ea4f3</cites><orcidid>0000-0002-0574-7803</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00500-019-04661-5$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2917906603?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Bai, Jianli</creatorcontrib><creatorcontrib>Yu, Jia</creatorcontrib><creatorcontrib>Gao, Xiang</creatorcontrib><title>Secure auditing and deduplication for encrypted cloud data supporting ownership modification</title><title>Soft computing (Berlin, Germany)</title><addtitle>Soft Comput</addtitle><description>Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space by exploiting the duplication techniques. However, when a data owner deletes or modifies his outsourced data, he should lose the ownership for the original data and should not be able to successfully retrieve this data any more. For all we know, existing cloud storage auditing and deduplication literatures fail to support the modifications of ownership, which actually occur quite often in actual cloud storage scenarios. In this paper, we propose the first deduplicated data integrity auditing scheme supporting the ownership modification. It guarantees the integrity of the outsourced data and supports the dynamic access control over the outsourced data. We employ a re-encryption algorithm and the secure identity-based broadcast encryption technology, which prevent data from being disclosed to the revoked owners, even if they previously had prior ownership of these data. The security and efficiency of our proposed scheme have been validated by detailed analysis and experiments.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Artificial Intelligence</subject><subject>Cloud computing</subject><subject>Computational Intelligence</subject><subject>Control</subject><subject>Data encryption</subject><subject>Data integrity</subject><subject>Design</subject><subject>Encryption</subject><subject>Engineering</subject><subject>Integrity</subject><subject>Mathematical Logic and Foundations</subject><subject>Mechatronics</subject><subject>Methodologies and Application</subject><subject>Outsourcing</subject><subject>Ownership</subject><subject>Privacy</subject><subject>Robotics</subject><subject>Storage</subject><issn>1432-7643</issn><issn>1433-7479</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kMtKAzEUQIMoWKs_4CrgOnrznGYpxRcUXKg7IWTyqFPayZjMIP69Y6fgztW9i3PuhYPQJYVrClDdFAAJQIBqAkIpSuQRmlHBOalEpY_3OyOVEvwUnZWyAWC0knyG3l-CG3LAdvBN37RrbFuPffBDt22c7ZvU4pgyDq3L310fPHbbNIyE7S0uQ9elvLfSVxty-Wg6vEu-iQf1HJ1Euy3h4jDn6O3-7nX5SFbPD0_L2xVxnOqeCMq4164KyssFZTQwriQXdBF0rWsHkXIubYw10wwECK-p8gsJNZUiWBH5HF1Nd7ucPodQerNJQ27Hl4ZpWmlQCvhIsYlyOZWSQzRdbnY2fxsK5reimSqasaLZVzRylPgklRFu1yH_nf7H-gEcd3Wo</recordid><startdate>20200801</startdate><enddate>20200801</enddate><creator>Bai, Jianli</creator><creator>Yu, Jia</creator><creator>Gao, Xiang</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0002-0574-7803</orcidid></search><sort><creationdate>20200801</creationdate><title>Secure auditing and deduplication for encrypted cloud data supporting ownership modification</title><author>Bai, Jianli ; Yu, Jia ; Gao, Xiang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-4123d9c7e6d58121e23653418e9b9bc0f1335affb2920404d916d850b154ea4f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Artificial Intelligence</topic><topic>Cloud computing</topic><topic>Computational Intelligence</topic><topic>Control</topic><topic>Data encryption</topic><topic>Data integrity</topic><topic>Design</topic><topic>Encryption</topic><topic>Engineering</topic><topic>Integrity</topic><topic>Mathematical Logic and Foundations</topic><topic>Mechatronics</topic><topic>Methodologies and Application</topic><topic>Outsourcing</topic><topic>Ownership</topic><topic>Privacy</topic><topic>Robotics</topic><topic>Storage</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bai, Jianli</creatorcontrib><creatorcontrib>Yu, Jia</creatorcontrib><creatorcontrib>Gao, Xiang</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Soft computing (Berlin, Germany)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bai, Jianli</au><au>Yu, Jia</au><au>Gao, Xiang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure auditing and deduplication for encrypted cloud data supporting ownership modification</atitle><jtitle>Soft computing (Berlin, Germany)</jtitle><stitle>Soft Comput</stitle><date>2020-08-01</date><risdate>2020</risdate><volume>24</volume><issue>16</issue><spage>12197</spage><epage>12214</epage><pages>12197-12214</pages><issn>1432-7643</issn><eissn>1433-7479</eissn><abstract>Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space by exploiting the duplication techniques. However, when a data owner deletes or modifies his outsourced data, he should lose the ownership for the original data and should not be able to successfully retrieve this data any more. For all we know, existing cloud storage auditing and deduplication literatures fail to support the modifications of ownership, which actually occur quite often in actual cloud storage scenarios. In this paper, we propose the first deduplicated data integrity auditing scheme supporting the ownership modification. It guarantees the integrity of the outsourced data and supports the dynamic access control over the outsourced data. We employ a re-encryption algorithm and the secure identity-based broadcast encryption technology, which prevent data from being disclosed to the revoked owners, even if they previously had prior ownership of these data. The security and efficiency of our proposed scheme have been validated by detailed analysis and experiments.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s00500-019-04661-5</doi><tpages>18</tpages><orcidid>https://orcid.org/0000-0002-0574-7803</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1432-7643
ispartof Soft computing (Berlin, Germany), 2020-08, Vol.24 (16), p.12197-12214
issn 1432-7643
1433-7479
language eng
recordid cdi_proquest_journals_2917906603
source SpringerNature Journals; ProQuest Central UK/Ireland; ProQuest Central
subjects Access control
Algorithms
Artificial Intelligence
Cloud computing
Computational Intelligence
Control
Data encryption
Data integrity
Design
Encryption
Engineering
Integrity
Mathematical Logic and Foundations
Mechatronics
Methodologies and Application
Outsourcing
Ownership
Privacy
Robotics
Storage
title Secure auditing and deduplication for encrypted cloud data supporting ownership modification
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T05%3A27%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20auditing%20and%20deduplication%20for%20encrypted%20cloud%20data%20supporting%20ownership%20modification&rft.jtitle=Soft%20computing%20(Berlin,%20Germany)&rft.au=Bai,%20Jianli&rft.date=2020-08-01&rft.volume=24&rft.issue=16&rft.spage=12197&rft.epage=12214&rft.pages=12197-12214&rft.issn=1432-7643&rft.eissn=1433-7479&rft_id=info:doi/10.1007/s00500-019-04661-5&rft_dat=%3Cproquest_cross%3E2917906603%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2917906603&rft_id=info:pmid/&rfr_iscdi=true