Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Provably secure cloud storage for mobile networks with less computation and smaller overhead

Abstract

Secure cloud storage (SCS) guarantees the data outsourced to the cloud to remain intact as it was before being outsourced. Previous schemes to ensure cloud storage reliability are either computationally heavy or admitting long overheads, thus are not suitable for mobile networks with strict computation/bandwidth restrictions. In this paper, we build an efficient SCS system for mobile networks based on homomorphic MAC and propose domain extension to enhance the security level and flexibility of the system. In addition, we give a formal security model which is compatible to previous ones and analyze our system in that model. We also give implementations on mobile devices to verify the effectiveness of our system.

This is a preview of subscription content, log in to check access.

References

  1. 1

    Deswarte Y, Quisquater J J, Saïdane A. Remote integrity checking—how to trust files stored on untrusted servers. In: Proceedings of Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), Lausanne, 2003. 1–11

  2. 2

    Filho D, Barreto P. Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150, 2006. http://eprint.iacr.org/

  3. 3

    Naor M, Rothblum G N. The complexity of online memory checking. In: Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005), Pittsburgh, 2005. 573–584

  4. 4

    Schwarz T, Miller E. Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, Lisboa, 2006. 12

  5. 5

    Ateniese G, Burns R C, Curtmola R, et al. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, 2007. 598–609

  6. 6

    Zhu Y, Wang H X, Hu Z X, et al. Efficient provable data possession for hybrid clouds. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, 2010. 756–758

  7. 7

    Erway C, Küp¸cü A, Papamanthou C, et al. Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, 2009. 213–222

  8. 8

    Juels A, Kaliski B. Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, 2007. 584–597

  9. 9

    Shacham H, Waters B. Compact proofs of retrievability. In: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, Australia, 2008. 90–107

  10. 10

    Xu J, Chang E. Towards efficient proofs of retrievability. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, Korea, 2012. 79–80

  11. 11

    Ateniese G, Kamara S, Katz J. Proofs of storage from homomorphic identification protocols. In: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2009), Tokyo, 2009. 319–333

  12. 12

    Bowers K, Juels A, Oprea A. Proofs of retrievability: theory and implementation. In: Proceedings of the ACM Workshop on Cloud Computing Security, Chicago, 2009. 43–54

  13. 13

    Dodis Y, Vadhan S, Wichs D. Proofs of retrievability via hardness amplification. In: Proceedings of the 6th Theory of Cryptography Conference (TCC 2009). Berlin: Springer, 2009. 109–127

  14. 14

    Ateniese G, Pietro R, Mancini L, et al. Scalable and efficient provable data possession. In: Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2008), Turkey, 2008. 1–10

  15. 15

    Ma H, Zhang R. Secure cloud storage for dynamic group: how to achieve identity privacy-preserving and privilege control. In: Proceedings of the 9th International Conference Network and System Security. Berlin: Springer, 2015. 254–267

  16. 16

    Wang Q, Wang C, Li J, et al. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security, Saint-Malo, 2009. 355–370

  17. 17

    Stefanov E, Dijk M, Juels A, et al. Iris: a scalable cloud file system with efficient integrity checks. In: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC 2012). New York: ACM, 2012. 229–238

  18. 18

    Cash D, Küp¸cü A, Wichs D. Dynamic proofs of retrievability via oblivious RAM. In: Advances in Cryptology— EUROCRYPT 2013. Berlin: Springer, 2013. 279–295

  19. 19

    Shi E, Stefanov E, Papamanthou C. Practical dynamic proofs of retrievability. In: Proceedigns of ACM Conference on Computer and Communications Security (CCS 2013), Berlin, 2013. 325–336

  20. 20

    Guan C, Ren K, Zhang F, et al. Symmetric-key based proofs of retrievability supporting public verification. In: Proceedigns of the 20th European Symposium on Research in Computer Security (ESORICS 2015). Berlin: Springer, 2015. 203–223

  21. 21

    Lillibridge M, Elnikety S, Birrell A, et al. A cooperative internet backup scheme. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, San Antonio, 2003. 29–41

  22. 22

    Wang C, Chow S, Wang Q, et al. Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput, 2013, 62: 362–375

  23. 23

    Yang K, Jia X. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parall Distrib Syst, 2013, 24: 1717–1726

  24. 24

    Chen F, Xiang T, Yang Y, et al. Secure cloud storage meets with secure network coding. In: Proceedings of Conference on Computer Communications, Canada, 2014. 673–681

  25. 25

    Agrawal S, Boneh D. Homomorphic macs: mac-based integrity for network coding. In: Proceedings of the 7th International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, 2009. 292–305

  26. 26

    Cheng C, Jiang T. A novel homomorphic MAC scheme for authentication in network coding. IEEE Commun Lett, 2011, 15: 1228–1230

  27. 27

    Shoup V. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332, 2004. http://eprint.iacr.org/

  28. 28

    Krawczyk H. Cryptographic extraction and key derivation: the HKDF scheme. In: Proceedings of the 30th Annual Cryptology Conference (CRYPTO 2010). Berlin: Springer, 2010. 631–648

Download references

Acknowledgements

This work was supported by Strategic Priority Research Program of the Chinese Academy of Sciences (Grant Nos. XDA06010703, XDA06010701), National Natural Science Foundation of China (Grant Nos. 61472416, 61272478, 61632020), Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-14-002), and CREST, Japan Science and Technolegy Agency.

Author information

Correspondence to Hui Ma.

Additional information

Amazon, http://status.aws.amazon.com/s3us-20080720.html and http://status.aws.amazon.com/s3-20080720.html.

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Zhang, R., Ma, H., Lu, Y. et al. Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci. China Inf. Sci. 60, 122104 (2017). https://doi.org/10.1007/s11432-016-0038-6

Download citation

Keywords

  • secure cloud storage
  • mobile networks
  • homomorphic MAC
  • domain extension
  • applied cryptography