Peer-to-Peer Networking and Applications

, Volume 9, Issue 5, pp 854–863 | Cite as

Efficient data integrity auditing for storage security in mobile health cloud

  • Yongjun Ren
  • Jian Shen
  • Yuhui Zheng
  • Jin Wang
  • Han-Chieh Chao


Cloud storage services can enable data owners to eliminate the need for the initial investment of expensive infrastructure setup and also minimize development and maintenance costs. Outsourcing the health data to e-health cloud storage server is very beneficial. Nonetheless, storing the health data on cloud servers also brings serious security challenges. In this paper, we propose a highly efficient data integrity auditing scheme for cloud storage for mobile health applications. The authentication tag for each data block generated by biosensor nodes is minimal in our scheme due to the use of hash operation. Moreover, in data integrity checking phase, message-locked encryption scheme is utilized to encrypt and transport the auditing information of the checked data blocks, which significantly reduces the required amount of calculation and communication resources. Compared with the conventional third party auditing schemes, the presented scheme speeds up the tag generation and tag checking process by more than one thousand times.


e-Health cloud Mobile health Cloud storage Data storage auditing 


  1. 1.
    Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Generation Computer Systems 28(3):583–592CrossRefGoogle Scholar
  2. 2.
    Yi F, Moon I, Lee Y (2014) A Multispectral Photon-Counting Double Random Phase Encoding Scheme for Image Authentication. Sensors 14(5):8877–8894CrossRefGoogle Scholar
  3. 3.
    Bessani A, Correia M, Quaresma B, Andr F, Sousa P (2013) DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans Storage(TOS) 9(4):31–46Google Scholar
  4. 4.
    Wang J, Yin Y, Zhang J, Lee S, Sherratt R (2013) Mobility Based Energy Efficient and Multi-sink Algorithms for Consumer Home Networks. IEEE Trans Consum Electron 59(1):77–84CrossRefGoogle Scholar
  5. 5.
    Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings 14th ACM Conference Computer and Comm. Security(CCS ’07), pp 598–609Google Scholar
  6. 6.
    Juels A, Kaliski B (2007) PORs: Proofs of retrievability for large files. In: Proceedings 14th ACM Conference Computer and Committee Security(CCS ’07), pp 584–597Google Scholar
  7. 7.
    Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442–483MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Sookhak M, Talebian H, Ahmed E, Gani A (2014) A review on remote data auditing in single cloud server:Taxonomy and open issues. J Netw Comput Appl 43(8):121–141CrossRefGoogle Scholar
  9. 9.
    Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings16th ACM Conference Computer and Committee Security(CCS ’09), pp 213–222Google Scholar
  10. 10.
    Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving Efficient Cloud Search Services:Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing. IEICE Trans Commun E98-B(1):190–200CrossRefGoogle Scholar
  11. 11.
    Shen J, Zheng W, Wang J, Zheng Y, Sun X (2013) An Efficient Verifiably Encrypted Signature from Weil Pairing. J Internet Technol 14(6):947–952Google Scholar
  12. 12.
    Wang B, Li B, Li H (2013) Public auditing for shared data with efficient user revocation in the cloud. Proc IEEE INFOCOM:2904–2912Google Scholar
  13. 13.
    Naor M, Rothblum G (2005) The complexity of online memory checking. In: Proceedings 46th Ann IEEE Symp Foundations of Computer Science (FOCS 05), pp 573–584Google Scholar
  14. 14.
    Zheng Q, Xu S (2011) Fair and Dynamic Proofs of Retrievability. In: Proceedings 1th ACM conference on Data and application security and privacy(CODASPY 2011), pp 237–248Google Scholar
  15. 15.
    Ateniese G, Kamara S, Katz J (2009) Proofs of storage from homomorphic identification protocols, pp 319–333Google Scholar
  16. 16.
    Wang Q, Wang C, Li J, Ren K, Lou W (2011) Enabling public verifiability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859CrossRefGoogle Scholar
  17. 17.
    Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. Proc.IEEE INFOCOM:525–533Google Scholar
  18. 18.
    Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437CrossRefGoogle Scholar
  19. 19.
    Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Knowl Data Eng 24(9):1717–1726Google Scholar
  20. 20.
    Yuan J, Yu S (2013) Proofs of retrievability with public verifiability and constant communication cost in cloud. In: Proceedings the 2013 International Workshop on Security in Cloud Computing (Cloud Computing 2013), pp 19–26Google Scholar
  21. 21.
    Abbas A, Khan S U (2014) A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds. IEEE J Biomed Health Inform 18(4):1431–1441MathSciNetCrossRefGoogle Scholar
  22. 22.
    Ahuja S P, Mani S, Zambrano Z (2012) A survey of the state of cloud computing in healthcare. Netw Commun Technol 1(2):12C19Google Scholar
  23. 23.
    Gu B, Sheng V S (2013) Feasibility and Finite Convergence Analysis for Accurate On-line –Support Vector Learning. IEEE Trans Neural Netw Learn Syst 24(8):1304–1315CrossRefGoogle Scholar
  24. 24.
    Wang J, Zhang Z, Xia F, Yuan W, Lee Sungyoung (2013) An Energy Efficient Stable Election-based Routing Algorithm for Wireless Sensor Networks. Sensors 13(11):14301–14320CrossRefGoogle Scholar
  25. 25.
    Li J, Li X, Yang B, Sun X (2015) Segmentation-based Image Copy-move Forgery Detection Scheme. In: IEEE Transactions on Information Forensics and SecurityGoogle Scholar
  26. 26.
    Bellare M, Keelveedhi S, Ristenpart T (2013) Message-Locked Encryption and Secure Deduplication. In: Proceedings 32th Intl Conference Theory and Applications of Cryptographic Techniques: Advances in Cryptology(EUROCRYPT ’2013), pp 296–312Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.Jiangsu Engineering Center of Network Monitoring, School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina
  2. 2.Department of Electronic EngineeringNational Ilan UniversityI-LanTaiwan

Personalised recommendations