Skip to main content
Log in

Efficient data integrity auditing for storage security in mobile health cloud

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Cloud storage services can enable data owners to eliminate the need for the initial investment of expensive infrastructure setup and also minimize development and maintenance costs. Outsourcing the health data to e-health cloud storage server is very beneficial. Nonetheless, storing the health data on cloud servers also brings serious security challenges. In this paper, we propose a highly efficient data integrity auditing scheme for cloud storage for mobile health applications. The authentication tag for each data block generated by biosensor nodes is minimal in our scheme due to the use of hash operation. Moreover, in data integrity checking phase, message-locked encryption scheme is utilized to encrypt and transport the auditing information of the checked data blocks, which significantly reduces the required amount of calculation and communication resources. Compared with the conventional third party auditing schemes, the presented scheme speeds up the tag generation and tag checking process by more than one thousand times.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Generation Computer Systems 28(3):583–592

    Article  Google Scholar 

  2. Yi F, Moon I, Lee Y (2014) A Multispectral Photon-Counting Double Random Phase Encoding Scheme for Image Authentication. Sensors 14(5):8877–8894

    Article  Google Scholar 

  3. Bessani A, Correia M, Quaresma B, Andr F, Sousa P (2013) DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans Storage(TOS) 9(4):31–46

    Google Scholar 

  4. Wang J, Yin Y, Zhang J, Lee S, Sherratt R (2013) Mobility Based Energy Efficient and Multi-sink Algorithms for Consumer Home Networks. IEEE Trans Consum Electron 59(1):77–84

    Article  Google Scholar 

  5. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings 14th ACM Conference Computer and Comm. Security(CCS ’07), pp 598–609

  6. Juels A, Kaliski B (2007) PORs: Proofs of retrievability for large files. In: Proceedings 14th ACM Conference Computer and Committee Security(CCS ’07), pp 584–597

  7. Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442–483

    Article  MathSciNet  MATH  Google Scholar 

  8. Sookhak M, Talebian H, Ahmed E, Gani A (2014) A review on remote data auditing in single cloud server:Taxonomy and open issues. J Netw Comput Appl 43(8):121–141

    Article  Google Scholar 

  9. Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings16th ACM Conference Computer and Committee Security(CCS ’09), pp 213–222

  10. Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving Efficient Cloud Search Services:Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing. IEICE Trans Commun E98-B(1):190–200

    Article  Google Scholar 

  11. Shen J, Zheng W, Wang J, Zheng Y, Sun X (2013) An Efficient Verifiably Encrypted Signature from Weil Pairing. J Internet Technol 14(6):947–952

    Google Scholar 

  12. Wang B, Li B, Li H (2013) Public auditing for shared data with efficient user revocation in the cloud. Proc IEEE INFOCOM:2904–2912

  13. Naor M, Rothblum G (2005) The complexity of online memory checking. In: Proceedings 46th Ann IEEE Symp Foundations of Computer Science (FOCS 05), pp 573–584

  14. Zheng Q, Xu S (2011) Fair and Dynamic Proofs of Retrievability. In: Proceedings 1th ACM conference on Data and application security and privacy(CODASPY 2011), pp 237–248

  15. Ateniese G, Kamara S, Katz J (2009) Proofs of storage from homomorphic identification protocols, pp 319–333

  16. Wang Q, Wang C, Li J, Ren K, Lou W (2011) Enabling public verifiability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859

    Article  Google Scholar 

  17. Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. Proc.IEEE INFOCOM:525–533

  18. Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437

    Article  Google Scholar 

  19. Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Knowl Data Eng 24(9):1717–1726

    Google Scholar 

  20. Yuan J, Yu S (2013) Proofs of retrievability with public verifiability and constant communication cost in cloud. In: Proceedings the 2013 International Workshop on Security in Cloud Computing (Cloud Computing 2013), pp 19–26

  21. Abbas A, Khan S U (2014) A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds. IEEE J Biomed Health Inform 18(4):1431–1441

    Article  MathSciNet  Google Scholar 

  22. Ahuja S P, Mani S, Zambrano Z (2012) A survey of the state of cloud computing in healthcare. Netw Commun Technol 1(2):12C19

    Google Scholar 

  23. Gu B, Sheng V S (2013) Feasibility and Finite Convergence Analysis for Accurate On-line –Support Vector Learning. IEEE Trans Neural Netw Learn Syst 24(8):1304–1315

    Article  Google Scholar 

  24. Wang J, Zhang Z, Xia F, Yuan W, Lee Sungyoung (2013) An Energy Efficient Stable Election-based Routing Algorithm for Wireless Sensor Networks. Sensors 13(11):14301–14320

    Article  Google Scholar 

  25. Li J, Li X, Yang B, Sun X (2015) Segmentation-based Image Copy-move Forgery Detection Scheme. In: IEEE Transactions on Information Forensics and Security

  26. Bellare M, Keelveedhi S, Ristenpart T (2013) Message-Locked Encryption and Secure Deduplication. In: Proceedings 32th Intl Conference Theory and Applications of Cryptographic Techniques: Advances in Cryptology(EUROCRYPT ’2013), pp 296–312

Download references

Acknowledgment

This work is supported by the NSFC (NO.61232016, 61300236, 61300237 and 61402234), Jiangsu Province Natural Science Research Program (NO. BK20130809, BK2012461), the prospective research projects in the future Network (NO. BY2013095-4-04), the open fund project from Jiangsu Engineering Center of Network Monitoring (NO. KJR1302, KJR1305), the Project of six personnel in Jiangsu Province (2013-WLW-012), the industrial Strategic Technology Development Program (10041740) funded by the Ministry of Trade, Industry and Energy (MOTIE) Korea, the open fund project from Jiangsu Engineering Center of Network Monitoring (KJR1302,KJR1305) , the research fund from Jiangsu Technology and Engineering Center of Meteorological Sensor Network in NUIST under Grant (No. KDXG1301), the PAPD fund and the national training programs of innovation and entrepreneurship for undergraduates (NO. N1885014041, N1885012119). Prof. Jin Wang is the corresponding author.

Conflict of interests

The authors declare that they have no conflict of interest.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongjun Ren.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ren, Y., Shen, J., Zheng, Y. et al. Efficient data integrity auditing for storage security in mobile health cloud. Peer-to-Peer Netw. Appl. 9, 854–863 (2016). https://doi.org/10.1007/s12083-015-0346-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0346-y

Keywords

Navigation