Abstract
Cloud storage services can enable data owners to eliminate the need for the initial investment of expensive infrastructure setup and also minimize development and maintenance costs. Outsourcing the health data to e-health cloud storage server is very beneficial. Nonetheless, storing the health data on cloud servers also brings serious security challenges. In this paper, we propose a highly efficient data integrity auditing scheme for cloud storage for mobile health applications. The authentication tag for each data block generated by biosensor nodes is minimal in our scheme due to the use of hash operation. Moreover, in data integrity checking phase, message-locked encryption scheme is utilized to encrypt and transport the auditing information of the checked data blocks, which significantly reduces the required amount of calculation and communication resources. Compared with the conventional third party auditing schemes, the presented scheme speeds up the tag generation and tag checking process by more than one thousand times.
Similar content being viewed by others
References
Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Generation Computer Systems 28(3):583–592
Yi F, Moon I, Lee Y (2014) A Multispectral Photon-Counting Double Random Phase Encoding Scheme for Image Authentication. Sensors 14(5):8877–8894
Bessani A, Correia M, Quaresma B, Andr F, Sousa P (2013) DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans Storage(TOS) 9(4):31–46
Wang J, Yin Y, Zhang J, Lee S, Sherratt R (2013) Mobility Based Energy Efficient and Multi-sink Algorithms for Consumer Home Networks. IEEE Trans Consum Electron 59(1):77–84
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings 14th ACM Conference Computer and Comm. Security(CCS ’07), pp 598–609
Juels A, Kaliski B (2007) PORs: Proofs of retrievability for large files. In: Proceedings 14th ACM Conference Computer and Committee Security(CCS ’07), pp 584–597
Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442–483
Sookhak M, Talebian H, Ahmed E, Gani A (2014) A review on remote data auditing in single cloud server:Taxonomy and open issues. J Netw Comput Appl 43(8):121–141
Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings16th ACM Conference Computer and Committee Security(CCS ’09), pp 213–222
Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving Efficient Cloud Search Services:Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing. IEICE Trans Commun E98-B(1):190–200
Shen J, Zheng W, Wang J, Zheng Y, Sun X (2013) An Efficient Verifiably Encrypted Signature from Weil Pairing. J Internet Technol 14(6):947–952
Wang B, Li B, Li H (2013) Public auditing for shared data with efficient user revocation in the cloud. Proc IEEE INFOCOM:2904–2912
Naor M, Rothblum G (2005) The complexity of online memory checking. In: Proceedings 46th Ann IEEE Symp Foundations of Computer Science (FOCS 05), pp 573–584
Zheng Q, Xu S (2011) Fair and Dynamic Proofs of Retrievability. In: Proceedings 1th ACM conference on Data and application security and privacy(CODASPY 2011), pp 237–248
Ateniese G, Kamara S, Katz J (2009) Proofs of storage from homomorphic identification protocols, pp 319–333
Wang Q, Wang C, Li J, Ren K, Lou W (2011) Enabling public verifiability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859
Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. Proc.IEEE INFOCOM:525–533
Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437
Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Knowl Data Eng 24(9):1717–1726
Yuan J, Yu S (2013) Proofs of retrievability with public verifiability and constant communication cost in cloud. In: Proceedings the 2013 International Workshop on Security in Cloud Computing (Cloud Computing 2013), pp 19–26
Abbas A, Khan S U (2014) A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds. IEEE J Biomed Health Inform 18(4):1431–1441
Ahuja S P, Mani S, Zambrano Z (2012) A survey of the state of cloud computing in healthcare. Netw Commun Technol 1(2):12C19
Gu B, Sheng V S (2013) Feasibility and Finite Convergence Analysis for Accurate On-line –Support Vector Learning. IEEE Trans Neural Netw Learn Syst 24(8):1304–1315
Wang J, Zhang Z, Xia F, Yuan W, Lee Sungyoung (2013) An Energy Efficient Stable Election-based Routing Algorithm for Wireless Sensor Networks. Sensors 13(11):14301–14320
Li J, Li X, Yang B, Sun X (2015) Segmentation-based Image Copy-move Forgery Detection Scheme. In: IEEE Transactions on Information Forensics and Security
Bellare M, Keelveedhi S, Ristenpart T (2013) Message-Locked Encryption and Secure Deduplication. In: Proceedings 32th Intl Conference Theory and Applications of Cryptographic Techniques: Advances in Cryptology(EUROCRYPT ’2013), pp 296–312
Acknowledgment
This work is supported by the NSFC (NO.61232016, 61300236, 61300237 and 61402234), Jiangsu Province Natural Science Research Program (NO. BK20130809, BK2012461), the prospective research projects in the future Network (NO. BY2013095-4-04), the open fund project from Jiangsu Engineering Center of Network Monitoring (NO. KJR1302, KJR1305), the Project of six personnel in Jiangsu Province (2013-WLW-012), the industrial Strategic Technology Development Program (10041740) funded by the Ministry of Trade, Industry and Energy (MOTIE) Korea, the open fund project from Jiangsu Engineering Center of Network Monitoring (KJR1302,KJR1305) , the research fund from Jiangsu Technology and Engineering Center of Meteorological Sensor Network in NUIST under Grant (No. KDXG1301), the PAPD fund and the national training programs of innovation and entrepreneurship for undergraduates (NO. N1885014041, N1885012119). Prof. Jin Wang is the corresponding author.
Conflict of interests
The authors declare that they have no conflict of interest.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ren, Y., Shen, J., Zheng, Y. et al. Efficient data integrity auditing for storage security in mobile health cloud. Peer-to-Peer Netw. Appl. 9, 854–863 (2016). https://doi.org/10.1007/s12083-015-0346-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-015-0346-y