Secure auditing and deduplication for encrypted cloud data supporting ownership modification
Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space...
Gespeichert in:
Veröffentlicht in: | Soft computing (Berlin, Germany) Germany), 2020-08, Vol.24 (16), p.12197-12214 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 12214 |
---|---|
container_issue | 16 |
container_start_page | 12197 |
container_title | Soft computing (Berlin, Germany) |
container_volume | 24 |
creator | Bai, Jianli Yu, Jia Gao, Xiang |
description | Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space by exploiting the duplication techniques. However, when a data owner deletes or modifies his outsourced data, he should lose the ownership for the original data and should not be able to successfully retrieve this data any more. For all we know, existing cloud storage auditing and deduplication literatures fail to support the modifications of ownership, which actually occur quite often in actual cloud storage scenarios. In this paper, we propose the first deduplicated data integrity auditing scheme supporting the ownership modification. It guarantees the integrity of the outsourced data and supports the dynamic access control over the outsourced data. We employ a re-encryption algorithm and the secure identity-based broadcast encryption technology, which prevent data from being disclosed to the revoked owners, even if they previously had prior ownership of these data. The security and efficiency of our proposed scheme have been validated by detailed analysis and experiments. |
doi_str_mv | 10.1007/s00500-019-04661-5 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2917906603</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2917906603</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-4123d9c7e6d58121e23653418e9b9bc0f1335affb2920404d916d850b154ea4f3</originalsourceid><addsrcrecordid>eNp9kMtKAzEUQIMoWKs_4CrgOnrznGYpxRcUXKg7IWTyqFPayZjMIP69Y6fgztW9i3PuhYPQJYVrClDdFAAJQIBqAkIpSuQRmlHBOalEpY_3OyOVEvwUnZWyAWC0knyG3l-CG3LAdvBN37RrbFuPffBDt22c7ZvU4pgyDq3L310fPHbbNIyE7S0uQ9elvLfSVxty-Wg6vEu-iQf1HJ1Euy3h4jDn6O3-7nX5SFbPD0_L2xVxnOqeCMq4164KyssFZTQwriQXdBF0rWsHkXIubYw10wwECK-p8gsJNZUiWBH5HF1Nd7ucPodQerNJQ27Hl4ZpWmlQCvhIsYlyOZWSQzRdbnY2fxsK5reimSqasaLZVzRylPgklRFu1yH_nf7H-gEcd3Wo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2917906603</pqid></control><display><type>article</type><title>Secure auditing and deduplication for encrypted cloud data supporting ownership modification</title><source>SpringerNature Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Bai, Jianli ; Yu, Jia ; Gao, Xiang</creator><creatorcontrib>Bai, Jianli ; Yu, Jia ; Gao, Xiang</creatorcontrib><description>Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space by exploiting the duplication techniques. However, when a data owner deletes or modifies his outsourced data, he should lose the ownership for the original data and should not be able to successfully retrieve this data any more. For all we know, existing cloud storage auditing and deduplication literatures fail to support the modifications of ownership, which actually occur quite often in actual cloud storage scenarios. In this paper, we propose the first deduplicated data integrity auditing scheme supporting the ownership modification. It guarantees the integrity of the outsourced data and supports the dynamic access control over the outsourced data. We employ a re-encryption algorithm and the secure identity-based broadcast encryption technology, which prevent data from being disclosed to the revoked owners, even if they previously had prior ownership of these data. The security and efficiency of our proposed scheme have been validated by detailed analysis and experiments.</description><identifier>ISSN: 1432-7643</identifier><identifier>EISSN: 1433-7479</identifier><identifier>DOI: 10.1007/s00500-019-04661-5</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Access control ; Algorithms ; Artificial Intelligence ; Cloud computing ; Computational Intelligence ; Control ; Data encryption ; Data integrity ; Design ; Encryption ; Engineering ; Integrity ; Mathematical Logic and Foundations ; Mechatronics ; Methodologies and Application ; Outsourcing ; Ownership ; Privacy ; Robotics ; Storage</subject><ispartof>Soft computing (Berlin, Germany), 2020-08, Vol.24 (16), p.12197-12214</ispartof><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2020</rights><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-4123d9c7e6d58121e23653418e9b9bc0f1335affb2920404d916d850b154ea4f3</citedby><cites>FETCH-LOGICAL-c319t-4123d9c7e6d58121e23653418e9b9bc0f1335affb2920404d916d850b154ea4f3</cites><orcidid>0000-0002-0574-7803</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00500-019-04661-5$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2917906603?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Bai, Jianli</creatorcontrib><creatorcontrib>Yu, Jia</creatorcontrib><creatorcontrib>Gao, Xiang</creatorcontrib><title>Secure auditing and deduplication for encrypted cloud data supporting ownership modification</title><title>Soft computing (Berlin, Germany)</title><addtitle>Soft Comput</addtitle><description>Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space by exploiting the duplication techniques. However, when a data owner deletes or modifies his outsourced data, he should lose the ownership for the original data and should not be able to successfully retrieve this data any more. For all we know, existing cloud storage auditing and deduplication literatures fail to support the modifications of ownership, which actually occur quite often in actual cloud storage scenarios. In this paper, we propose the first deduplicated data integrity auditing scheme supporting the ownership modification. It guarantees the integrity of the outsourced data and supports the dynamic access control over the outsourced data. We employ a re-encryption algorithm and the secure identity-based broadcast encryption technology, which prevent data from being disclosed to the revoked owners, even if they previously had prior ownership of these data. The security and efficiency of our proposed scheme have been validated by detailed analysis and experiments.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Artificial Intelligence</subject><subject>Cloud computing</subject><subject>Computational Intelligence</subject><subject>Control</subject><subject>Data encryption</subject><subject>Data integrity</subject><subject>Design</subject><subject>Encryption</subject><subject>Engineering</subject><subject>Integrity</subject><subject>Mathematical Logic and Foundations</subject><subject>Mechatronics</subject><subject>Methodologies and Application</subject><subject>Outsourcing</subject><subject>Ownership</subject><subject>Privacy</subject><subject>Robotics</subject><subject>Storage</subject><issn>1432-7643</issn><issn>1433-7479</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kMtKAzEUQIMoWKs_4CrgOnrznGYpxRcUXKg7IWTyqFPayZjMIP69Y6fgztW9i3PuhYPQJYVrClDdFAAJQIBqAkIpSuQRmlHBOalEpY_3OyOVEvwUnZWyAWC0knyG3l-CG3LAdvBN37RrbFuPffBDt22c7ZvU4pgyDq3L310fPHbbNIyE7S0uQ9elvLfSVxty-Wg6vEu-iQf1HJ1Euy3h4jDn6O3-7nX5SFbPD0_L2xVxnOqeCMq4164KyssFZTQwriQXdBF0rWsHkXIubYw10wwECK-p8gsJNZUiWBH5HF1Nd7ucPodQerNJQ27Hl4ZpWmlQCvhIsYlyOZWSQzRdbnY2fxsK5reimSqasaLZVzRylPgklRFu1yH_nf7H-gEcd3Wo</recordid><startdate>20200801</startdate><enddate>20200801</enddate><creator>Bai, Jianli</creator><creator>Yu, Jia</creator><creator>Gao, Xiang</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0002-0574-7803</orcidid></search><sort><creationdate>20200801</creationdate><title>Secure auditing and deduplication for encrypted cloud data supporting ownership modification</title><author>Bai, Jianli ; Yu, Jia ; Gao, Xiang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-4123d9c7e6d58121e23653418e9b9bc0f1335affb2920404d916d850b154ea4f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Artificial Intelligence</topic><topic>Cloud computing</topic><topic>Computational Intelligence</topic><topic>Control</topic><topic>Data encryption</topic><topic>Data integrity</topic><topic>Design</topic><topic>Encryption</topic><topic>Engineering</topic><topic>Integrity</topic><topic>Mathematical Logic and Foundations</topic><topic>Mechatronics</topic><topic>Methodologies and Application</topic><topic>Outsourcing</topic><topic>Ownership</topic><topic>Privacy</topic><topic>Robotics</topic><topic>Storage</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bai, Jianli</creatorcontrib><creatorcontrib>Yu, Jia</creatorcontrib><creatorcontrib>Gao, Xiang</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Soft computing (Berlin, Germany)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bai, Jianli</au><au>Yu, Jia</au><au>Gao, Xiang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure auditing and deduplication for encrypted cloud data supporting ownership modification</atitle><jtitle>Soft computing (Berlin, Germany)</jtitle><stitle>Soft Comput</stitle><date>2020-08-01</date><risdate>2020</risdate><volume>24</volume><issue>16</issue><spage>12197</spage><epage>12214</epage><pages>12197-12214</pages><issn>1432-7643</issn><eissn>1433-7479</eissn><abstract>Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space by exploiting the duplication techniques. However, when a data owner deletes or modifies his outsourced data, he should lose the ownership for the original data and should not be able to successfully retrieve this data any more. For all we know, existing cloud storage auditing and deduplication literatures fail to support the modifications of ownership, which actually occur quite often in actual cloud storage scenarios. In this paper, we propose the first deduplicated data integrity auditing scheme supporting the ownership modification. It guarantees the integrity of the outsourced data and supports the dynamic access control over the outsourced data. We employ a re-encryption algorithm and the secure identity-based broadcast encryption technology, which prevent data from being disclosed to the revoked owners, even if they previously had prior ownership of these data. The security and efficiency of our proposed scheme have been validated by detailed analysis and experiments.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s00500-019-04661-5</doi><tpages>18</tpages><orcidid>https://orcid.org/0000-0002-0574-7803</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1432-7643 |
ispartof | Soft computing (Berlin, Germany), 2020-08, Vol.24 (16), p.12197-12214 |
issn | 1432-7643 1433-7479 |
language | eng |
recordid | cdi_proquest_journals_2917906603 |
source | SpringerNature Journals; ProQuest Central UK/Ireland; ProQuest Central |
subjects | Access control Algorithms Artificial Intelligence Cloud computing Computational Intelligence Control Data encryption Data integrity Design Encryption Engineering Integrity Mathematical Logic and Foundations Mechatronics Methodologies and Application Outsourcing Ownership Privacy Robotics Storage |
title | Secure auditing and deduplication for encrypted cloud data supporting ownership modification |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T05%3A27%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20auditing%20and%20deduplication%20for%20encrypted%20cloud%20data%20supporting%20ownership%20modification&rft.jtitle=Soft%20computing%20(Berlin,%20Germany)&rft.au=Bai,%20Jianli&rft.date=2020-08-01&rft.volume=24&rft.issue=16&rft.spage=12197&rft.epage=12214&rft.pages=12197-12214&rft.issn=1432-7643&rft.eissn=1433-7479&rft_id=info:doi/10.1007/s00500-019-04661-5&rft_dat=%3Cproquest_cross%3E2917906603%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2917906603&rft_id=info:pmid/&rfr_iscdi=true |