Abstract

The cloud storage auditing with deduplication is able to verify the integrity of data stored in the cloud while the cloud needs to keep only a single copy of duplicated file. To the best of our knowledge, all of the existing cloud storage auditing schemes with deduplication are vulnerable to brute-force dictionary attacks, which incurs the leakage of user privacy. In this paper, we focus on a new aspect of being against brute-force dictionary attacks on cloud storage auditing. We propose a cloud storage auditing scheme with deduplication supporting strong privacy protection, in which the privacy of user's file would not be disclosed to the cloud and other parties when this user's file is predictable or from a small space. In the proposed scheme, we design a novel method to generate the file index for duplicate check, and use a new strategy to generate the key for file encryption. In addition, the user only needs to perform lightweight computation to generate data authenticators, verify cloud data integrity, and retrieve the file from the cloud. The security proof and the performance evaluation demonstrate that the proposed scheme achieves desirable security and efficiency.

Highlights

  • With the rapid development of cloud computing, cloud storage has been widely accepted by individuals and enterprises for its advantages of universal access, low costs and on-demand service

  • Our main contributions can be summarized as below: In this paper, we investigate how to fully resist the bruteforce dictionary attacks and realize deduplication with strong privacy protection in cloud storage auditing, and propose a concrete scheme satisfying this property

  • Definition 2: We say a lightweight cloud storage auditing scheme with deduplication supporting strong privacy protection is secure if the following condition holds: whenever an adversary is able to pass the validation of challenger by generating a valid auditing proof Auditing.proof with non-negligible probability, there is a knowledge extractor that can extract the challenged data blocks except possibly with negligible probability

Read more

Summary

INTRODUCTION

With the rapid development of cloud computing, cloud storage has been widely accepted by individuals and enterprises for its advantages of universal access, low costs and on-demand service. Liu et al [20] presented another cloud storage auditing scheme with deduplication In this scheme, in order to achieve authenticator deduplication, the initial user utilizes the file’s hash value as the private key for computing data authenticators. All of the above schemes cannot achieve the deduplication supporting strong private protection for encrypted data in cloud storage auditing It means that the useful information of user’s file might be disclosed to the malicious cloud or other parties when this user’s file is predictable or from a small space. DESIGN GOALS To achieve lightweight cloud storage auditing with deduplication supporting strong privacy protection, our scheme should satisfy the following goals: 1) Correctness: to ensure that the cloud can pass the user’s validation only if the auditing proof it generates is valid, and the ciphertext retrieved from the cloud can pass the user’s validation only if the ciphertext is intact. 5) Efficient storage: to guarantee that the cloud keeps only a single copy of the duplicated file and its corresponding authenticators

DEFINITION
THE PROPOSED SCHEME
SECURITY ANALYSIS
FUNCTIONALITIES COMPARISON
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call