Abstract

More and more users are uploading their data to the cloud without storing any copies locally. Under the premise that cloud users cannot fully trust cloud service providers, how to ensure the integrity of users’ shared data in the cloud storage environment is one of the current research hotspots. In this paper, we propose a secure and effective data sharing scheme for dynamic user groups. (1) In order to realize the user identity tracking and the addition and deletion of dynamic group users, we add a new role called Rights Distribution Center (RDC) in our scheme. (2) To protect the privacy of user identity, when performing third party audit to verify data integrity, it is not possible to determine which user is a specific user. Therefore, the fairness of the audit can be promoted. (3) Define a new integrity audit model for shared cloud data. In this scheme, the user sends the encrypted data to the cloud and the data tag to the Rights Distribution Center (RDC) by using data blindness technology. Finally, we prove the security of the scheme through provable security theory. In addition, the experimental data shows that our proposed scheme is more efficient and scalable than the state-of-the-art solution.

Highlights

  • As an emerging network storage technology, cloud storage has been extended and developed in cloud computing

  • Third party auditor (TPA) can obtain the block identifier during the process of verifying the data integrity. If these identity information and confidential information in the shared data group cannot get effective protection, they will be leaked to a third party auditor (TPA) such as the situations that user in the group plays a crucial role or data block in the shared data has higher value

  • In the process of integrity auditing performed by the third party audit, when the cloud service provider submits the certificate to the TPA for complete public verification, the cloud service provider sends the linear combination value of the data to the third party audit

Read more

Summary

Introduction

As an emerging network storage technology, cloud storage has been extended and developed in cloud computing. Through data storage and sharing services in cloud computing, group members can share data in the form of a group. As a member of a group, users can access the shared data, and modify the shared data. While cloud computing makes it easier for users to share data, users are still concerned about the security of data, especially the integrity of data, due to some security factors in cloud storage. Third party auditor (TPA) can obtain the block identifier (that is, the identity of each shared block signer) during the process of verifying the data integrity. Using the data storage and sharing services provided by cloud server, legitimate users can form a group by sharing data with each other. Users in the group can access the shared data, and modify the shared data. This series of problems happened to us [1]

Related Work
Preliminaries
Security Theory Assumption
Data Sharing Integrity Verification Threat Target
System Architecture
Security Analysis
Results and Discussion
Conclusions
Conflicts of Interest
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call