• DocumentCode
    112977
  • Title

    Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

  • Author

    Jian Liu ; Kun Huang ; Hong Rong ; Huimei Wang ; Ming Xian

  • Author_Institution
    State Key Lab. of Complex Electromagn. Environ. Effects on Electron. & Inf. Syst., Nat. Univ. of Defense Technol., Changsha, China
  • Volume
    10
  • Issue
    7
  • fYear
    2015
  • fDate
    Jul-15
  • Firstpage
    1513
  • Lastpage
    1528
  • Abstract
    To protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. Recently, regenerating codes have gained popularity due to their lower repair bandwidth while providing fault tolerance. Existing remote checking methods for regenerating-coded data only provide private auditing, requiring data owners to always stay online and handle auditing, as well as repairing, which is sometimes impractical. In this paper, we propose a public auditing scheme for the regenerating-code-based cloud storage. To solve the regeneration problem of failed authenticators in the absence of data owners, we introduce a proxy, which is privileged to regenerate the authenticators, into the traditional public auditing system model. Moreover, we design a novel public verifiable authenticator, which is generated by a couple of keys and can be regenerated using partial keys. Thus, our scheme can completely release data owners from online burden. In addition, we randomize the encode coefficients with a pseudorandom function to preserve data privacy. Extensive security analysis shows that our scheme is provable secure under random oracle model and experimental evaluation indicates that our scheme is highly efficient and can be feasibly integrated into the regenerating-code-based cloud storage.
  • Keywords
    auditing; cloud computing; cryptography; data integrity; data privacy; formal verification; software fault tolerance; storage management; system recovery; data integrity checking; data privacy-preserving public auditing scheme; failed authenticator regeneration problem; failure reparation; fault tolerance; outsourced data protection; partial keys; pseudorandom function; public verifiable authenticator; random oracle model; regenerating-code-based cloud storage; remote checking methods; repair bandwidth; security analysis; Cloud computing; Data models; Encoding; Maintenance engineering; Security; Servers; Vectors; Cloud storage; authenticator regeneration; privacy preserving; privileged; provable secure; proxy; public audit; regenerating codes;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2015.2416688
  • Filename
    7067407