2020
DOI: 10.1109/access.2020.3039981
|View full text |Cite
|
Sign up to set email alerts
|

Stateless Cloud Auditing Scheme for Non-Manager Dynamic Group Data With Privacy Preservation

Abstract: As one of the core services of cloud computing, cloud storage could satisfy various storage and management requirements caused by the growth of data. Considering the complexity and uncontrollability of the cloud storage environment, many cloud auditing schemes were presented to assure the integrity of data in the cloud. However, most existing schemes have security risks, such as identity privacy and data privacy disclosure, authority abuse of group managers and collusion attacks during user revocation. To solv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 37 publications
0
12
0
Order By: Relevance
“…The Subscript set of chal Loci Specific location of mi and query the IKL list to reveal its identity. But as mentioned in [5], [19], the participation of manager or TPA may lead to abuse of authority or data loss, so how to ensure data privacy and resist collusion attacks becomes very important. [5] proposed to use random masking technique to blind data ensuring data privacy against TPA.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The Subscript set of chal Loci Specific location of mi and query the IKL list to reveal its identity. But as mentioned in [5], [19], the participation of manager or TPA may lead to abuse of authority or data loss, so how to ensure data privacy and resist collusion attacks becomes very important. [5] proposed to use random masking technique to blind data ensuring data privacy against TPA.…”
Section: Related Workmentioning
confidence: 99%
“…But as mentioned in [5], [19], the participation of manager or TPA may lead to abuse of authority or data loss, so how to ensure data privacy and resist collusion attacks becomes very important. [5] proposed to use random masking technique to blind data ensuring data privacy against TPA. At the same time, shamir secret sharing is used to tracing the user's identity without group managers to resist collusion attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In CLPKC, like IBC, the authenticity of the public key of an user is implicit; however, the full private key of an user is known only to that user. Recently, a number of CLPKC-based shared data auditing protocols have been proposed in the literature [16][17][18][19][20][21][22][23][24]39] for traditional cloud storage systems. However, these protocols cannot be directly adopted for a FOG-CPS because of its discriminating characteristics as discussed below.…”
Section: Introductionmentioning
confidence: 99%
“…In these protocols, the auditor can extract the data blocks from the information received from the cloud as part of the data auditing process. Recently, a few privacy-preserving CLPKC-based shared data auditing protocols have been proposed by the researchers [23,24,39] for traditional cloud storage systems. But, none of these schemes can ensure the reliability criteria of the auditing service against a semi-trusted data auditor in a FOG-CPS, as defined above.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation