Abstract

The advent of cloud computing arouses the flourish of data sharing, promoting the development of research, especially in the fields of data analysis, artificial intelligence, etc. In order to address sensitive information hiding, auditing shared data efficiently and malicious manager preventing, we propose an identity-based auditing scheme for shared cloud data with a secure mechanism to hide sensitive information. This scheme provides a solution that allows users to share plaintext with researchers and keeps sensitive information invisible to the cloud and researchers at the same time. Besides, a formal security analysis is given to prove the strong security of the proposed scheme. Performance evaluation and experimental results demonstrate that our scheme is significantly more efficient over the existing scheme due to our novel mechanism for sensitive information hiding and simplifying signature algorithm. Compared to the existing approach to audit the integrity of shared data with sensitive information hiding, our scheme has desirable features and advantages as follow. Firstly, previous work has failed to construct a secure scheme to prevent malicious manager. We fill this gap and guarantee the integrity and authenticity of shared data. Secondly, our scheme constructs a novel system model to support high concurrency and massive data in the real scenario.

Highlights

  • Cloud computing has tremendous computing and storage capacity, opening up a whole new world of services, platforms, and applications

  • The administrator is more concerned about sensitive information hiding than doctors because the leak of sensitive information caused by software failure or human error would adversely affect the hospital’s reputation

  • OUR CONTRIBUTION In view of above issues, this paper proposes a novel and efficient identity-based auditing scheme, supporting sensitive information hiding and malicious manager preventing

Read more

Summary

INTRODUCTION

Cloud computing has tremendous computing and storage capacity, opening up a whole new world of services, platforms, and applications. The problem in this paper is how to construct an efficient and secure auditing scheme for shared data, which supports sensitive information hiding and malicious manager preventing. Facing the case of massive shared data and high concurrency, insufficient bandwidth and computing power at the manager side will cause the computational and communication bottlenecks in the whole scheme In their mechanism for sensitive information hiding, users must keep random values to recover the data in the future. B. OUR CONTRIBUTION In view of above issues, this paper proposes a novel and efficient identity-based auditing scheme, supporting sensitive information hiding and malicious manager preventing. We propose an efficient identity-based auditing scheme for shared cloud data, constructing a novel system model to support high concurrency and massive data in the real scenario. If P is a valid value, it can be concluded that the challenged file M is intact; otherwise, M is not intact

SECURITY MODEL
CONSTRUCTION
SYSTEM SETUP
PRIVATE KEY EXTRACTION
SIGNATURE GENERATION
FILE CHECK
PROOF GENERATION
SECURITY ANALYSIS
SOUNDNESS
MALICIOUS MANAGER PREVENTING
SENSITIVE INFORMATION HIDING
PROBABILISTIC ANALYSIS
Findings
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call