DocumentCode :
1996802
Title :
An efficient ID-based message recoverable privacy-preserving auditing scheme
Author :
Kiraz, Mehmet Sabir ; Sertkaya, Isa ; Uzunkol, Osmanbey
Author_Institution :
Math. & Comput. Sci., TUBITAK BILGEM, Turkey
fYear :
2015
fDate :
21-23 July 2015
Firstpage :
117
Lastpage :
124
Abstract :
One of the most important benefits of public cloud storage is outsourcing of management and maintenance with easy accessibility and retrievability over the internet. However, outsourcing data on the cloud brings new challenges such as integrity verification and privacy of data. More concretely, once the users outsource their data on the cloud they have no longer physical control over the data and this leads to the integrity protection issue. Hence, it is crucial to guarantee proof of data storage and integrity of the outsourced data. Several pairing-based auditing solutions have been proposed utilizing the Boneh-Lynn-Shacham (BLS) short signatures. They basically provide a desirable and efficient property of non-repudiation protocols. In this work, we propose the first ID-based privacy-preserving public auditing scheme with message recoverable signatures. Because of message recoverable auditing scheme, the message itself is implicitly included during the verification step that was not possible in previously proposed auditing schemes. Furthermore, we point out that the algorithm suites of existing schemes is either insecure or very inefficient due to the choice of the underlying bilinear map and its baseline parameter selections. We show that our scheme is more efficient than the recently proposed auditing schemes based on BLS like short signatures.
Keywords :
cloud computing; data integrity; data privacy; formal verification; outsourcing; BLS short signatures; Boneh-Lynn-Shacham short signatures; ID-based message recoverable privacy-preserving auditing scheme; ID-based privacy-preserving public auditing scheme; Internet; baseline parameter selections; bilinear map; data integrity; data outsourcing; data privacy; data storage; integrity protection; integrity verification; maintenance outsourcing; management outsourcing; message recoverable auditing scheme; message recoverable signatures; nonrepudiation protocols; pairing-based auditing solutions; public cloud storage; verification step; Cloud computing; Data privacy; Elliptic curves; Memory; Protocols; Security; Servers; Data storage; bilinear maps; message recoverable signatures; privacy preserving; public auditability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Privacy, Security and Trust (PST), 2015 13th Annual Conference on
Conference_Location :
Izmir
Type :
conf
DOI :
10.1109/PST.2015.7232962
Filename :
7232962
Link To Document :
بازگشت