Skip to main content
placeholder image

Public cloud data auditing with practical key update and zero knowledge privacy

Journal Article


Download full-text (Open Access)

Abstract


  • Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user’s private auditing key (as well as the authenticators those keys are associated with) without the user’s re-possession of the data remains an open problem. In this paper, we propose a key-updating and authenticator-evolving mechanism with zero-knowledge privacy of the stored files for secure cloud data auditing, which incorporates zero knowledge proof systems, proxy re-signatures and homomorphic linear authenticators. We instantiate our proposal with the state-of-the-art Shacham-Waters auditing scheme. When the cloud user needs to update his key, instead of downloading the entire file and re-generating all the authenticators, the user can just download and update the authenticators. This approach dramatically reduces the communication and computation cost while maintaining the desirable security. We formalize the security model of zero knowledge data privacy for auditing schemes in the key-updating context and prove the soundness and zero-knowledge privacy of the proposed construction. Finally, we analyze the complexity of communication, computation and storage costs of the improved protocol which demonstrates the practicality of the proposal.

UOW Authors


  •   Yu, Yong (external author)
  •   Li, Yannan
  •   Au, Man Ho Allen (external author)
  •   Susilo, Willy
  •   Choo, Kim-Kwang Raymond (external author)
  •   Zhang, Xinpeng (external author)

Publication Date


  • 2016

Citation


  • Yu, Y., Li, Y., Au, M. Ho., Susilo, W., Choo, K. & Zhang, X. (2016). Public cloud data auditing with practical key update and zero knowledge privacy. Lecture Notes in Computer Science, 9722 389-405. Melbourne, Australia Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings

Scopus Eid


  • 2-s2.0-84978252395

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=6752&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/5724

Has Global Citation Frequency


Number Of Pages


  • 16

Start Page


  • 389

End Page


  • 405

Volume


  • 9722

Place Of Publication


  • Germany

Abstract


  • Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user’s private auditing key (as well as the authenticators those keys are associated with) without the user’s re-possession of the data remains an open problem. In this paper, we propose a key-updating and authenticator-evolving mechanism with zero-knowledge privacy of the stored files for secure cloud data auditing, which incorporates zero knowledge proof systems, proxy re-signatures and homomorphic linear authenticators. We instantiate our proposal with the state-of-the-art Shacham-Waters auditing scheme. When the cloud user needs to update his key, instead of downloading the entire file and re-generating all the authenticators, the user can just download and update the authenticators. This approach dramatically reduces the communication and computation cost while maintaining the desirable security. We formalize the security model of zero knowledge data privacy for auditing schemes in the key-updating context and prove the soundness and zero-knowledge privacy of the proposed construction. Finally, we analyze the complexity of communication, computation and storage costs of the improved protocol which demonstrates the practicality of the proposal.

UOW Authors


  •   Yu, Yong (external author)
  •   Li, Yannan
  •   Au, Man Ho Allen (external author)
  •   Susilo, Willy
  •   Choo, Kim-Kwang Raymond (external author)
  •   Zhang, Xinpeng (external author)

Publication Date


  • 2016

Citation


  • Yu, Y., Li, Y., Au, M. Ho., Susilo, W., Choo, K. & Zhang, X. (2016). Public cloud data auditing with practical key update and zero knowledge privacy. Lecture Notes in Computer Science, 9722 389-405. Melbourne, Australia Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings

Scopus Eid


  • 2-s2.0-84978252395

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=6752&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/5724

Has Global Citation Frequency


Number Of Pages


  • 16

Start Page


  • 389

End Page


  • 405

Volume


  • 9722

Place Of Publication


  • Germany