{"title":"Public auditing for shared data in cloud with safe user revocation","authors":"S. Samundiswary, Nilima Dongre Jawade","doi":"10.1109/ICECA.2017.8203603","DOIUrl":null,"url":null,"abstract":"Cloud computing is a most adopted emerging technology by all organizations. Data storage and sharing of data in cloud is the most used services, whereas secure public auditing makes challenge in such services. Since cloud infrastructure which is not a trustable, users in the group for data sharing must compute their signatures and shares their block for integrity auditing. Any corruption, insider attack of data is possible in an outsourced data from users to cloud. All Participants in the sharing group can also able to modify data along with the access. If any user does any malicious activities, Group manager can revoke such user from group so revoked user cannot be part of sharing. The major challenges of data security is integrity of outsourced data in cloud is analyzed and proposes a privacy preserving public auditing mechanism where Third Party Auditor is used for integrity checking of data and Proxy resignature mechanism is used for re-signing keys for revoked users from the group. Additionally to avoid collusion between cloud and revoked user, our system uses secret sharing scheme called Cheater identifiable sharing based on Shamir's sharing scheme. The scheme identifies the dishonest user in the group which helps for efficient user revocation by group manager.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA.2017.8203603","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Cloud computing is a most adopted emerging technology by all organizations. Data storage and sharing of data in cloud is the most used services, whereas secure public auditing makes challenge in such services. Since cloud infrastructure which is not a trustable, users in the group for data sharing must compute their signatures and shares their block for integrity auditing. Any corruption, insider attack of data is possible in an outsourced data from users to cloud. All Participants in the sharing group can also able to modify data along with the access. If any user does any malicious activities, Group manager can revoke such user from group so revoked user cannot be part of sharing. The major challenges of data security is integrity of outsourced data in cloud is analyzed and proposes a privacy preserving public auditing mechanism where Third Party Auditor is used for integrity checking of data and Proxy resignature mechanism is used for re-signing keys for revoked users from the group. Additionally to avoid collusion between cloud and revoked user, our system uses secret sharing scheme called Cheater identifiable sharing based on Shamir's sharing scheme. The scheme identifies the dishonest user in the group which helps for efficient user revocation by group manager.
云计算是所有组织采用最多的新兴技术。云中的数据存储和数据共享是最常用的服务,而安全的公共审计是这类服务的挑战。由于云基础设施是不可信任的,因此数据共享组中的用户必须计算他们的签名并共享他们的块以进行完整性审计。数据的任何损坏,内部攻击都可能在外包数据从用户到云。共享组中的所有参与者还可以在访问的同时修改数据。如果任何用户进行任何恶意活动,组管理器可以将该用户从组中撤销,因此被撤销的用户不能参与共享。分析了数据安全面临的主要挑战是云外包数据的完整性,提出了一种保护隐私的公共审计机制,其中使用Third Party Auditor对数据进行完整性检查,使用Proxy resignature机制对被撤销用户从组中重新签名密钥。此外,为了避免云和被撤销用户之间的串谋,我们的系统在Shamir共享方案的基础上使用了一种称为骗子可识别共享的秘密共享方案。该方案可以识别组中的不诚实用户,从而帮助组管理器有效地撤销用户。