{"title":"Identity-Based Integrity Auditing Scheme With Sensitive Information Hiding for Proxy-Server-Assisted Cloud Storage Applications","authors":"Xinran Hu;Jinyong Chang;Tanvir Ahmad;Funing Zhang;Yuchen Zhang","doi":"10.1109/JIOT.2024.3491315","DOIUrl":null,"url":null,"abstract":"In recent years, the model of storing personal local data on cloud servers to save local space has become popular. However, this model also has certain security risk: the data stored in the cloud may be accidentally damaged or lost. How to perform remote integrity audit of these data is a meaningful research problem. Many current auditing schemes rely on the encryption of the entire data file to ensure data’s privacy, and the tag-generation of data owner (DO) itself, which bring a significant computational burden to the DO. In this article, we propose a technique of only blinding sensitive locations of user data without encrypting the entire file to improve the computational efficiency of current cloud auditing schemes. At the same time, it is also proposed to delegate the generation process of authentication tags to a proxy server (PS) to save DO’s computing resource. Then the integrity audit process is based on stored data file as well as PS’s authentication tags. In addition, the access control strategy of data user (DU)-request-then-DO-authorization has been implemented to facilitate the sharing of stored data, where DU means data user. Finally, security and performance analyses were conducted on the proposed system. The results indicate that our system is provably secure under classical cryptographic assumption and has certain performance advantages compared with related works.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 6","pages":"6673-6684"},"PeriodicalIF":8.9000,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10756579/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In recent years, the model of storing personal local data on cloud servers to save local space has become popular. However, this model also has certain security risk: the data stored in the cloud may be accidentally damaged or lost. How to perform remote integrity audit of these data is a meaningful research problem. Many current auditing schemes rely on the encryption of the entire data file to ensure data’s privacy, and the tag-generation of data owner (DO) itself, which bring a significant computational burden to the DO. In this article, we propose a technique of only blinding sensitive locations of user data without encrypting the entire file to improve the computational efficiency of current cloud auditing schemes. At the same time, it is also proposed to delegate the generation process of authentication tags to a proxy server (PS) to save DO’s computing resource. Then the integrity audit process is based on stored data file as well as PS’s authentication tags. In addition, the access control strategy of data user (DU)-request-then-DO-authorization has been implemented to facilitate the sharing of stored data, where DU means data user. Finally, security and performance analyses were conducted on the proposed system. The results indicate that our system is provably secure under classical cryptographic assumption and has certain performance advantages compared with related works.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.