Dynamic Secure Cloud Storage with Provenance
One concern in using cloud storage is that the sensitive data should be confidential to the servers which are outside the trust domain of data owners. Another issue is that the user may want to preserve his/her anonymity in the sharing or accessing of the data (such as in Web 2.0 applications). To fully enjoy the benefits of cloud storage, we need a confidential data sharing mechanism which is fine-grained (one can specify who can access which classes of his/her encrypted files), dynamic (the total number of users is not fixed in the setup, and any new user can decrypt previously encrypted messages), scalable (space requirement does not depend on the number of decryptors), accountable (anonymity can be revoked if necessary) and secure (trust level is minimized).
This paper addresses the problem of building a secure cloud storage system which supports dynamic users and data provenance. Previous system is based on specific constructions and does not offer all of the aforementioned desirable properties. Most importantly, dynamic user is not supported. We study the various features offered by cryptographic anonymous authentication and encryption mechanisms; and instantiate our design with verifier-local revocable group signature and identity-based broadcast encryption with constant size ciphertexts and private keys. To realize our concept, we equip the broadcast encryption with the dynamic ciphertext update feature, and give formal security guarantee against adaptive chosen-ciphertext decryption and update attacks.
KeywordsAnonymity broadcast encryption cloud storage dynamic encryption group signatures pairings secure provenance
Unable to display preview. Download preview PDF.
- 3.Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004)Google Scholar
- 6.Chase, M., Chow, S.S.M.: Improving Privacy and Security in Multi-Authority Attribute-Based Encryption. In: Proceedings of ACM Conference on Computer and Communications Security (CCS 2010), pp. 121–130 (2009)Google Scholar
- 11.Lamport, L.: Constructing Digital Signatures from a One Way Function. Technical report (1979)Google Scholar
- 12.Lu, R., Lin, X., Liang, X., Shen, X.S.: Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing. In: Proceedings of ACM Symposium on Information, Computer & Communication Security (ASIACCS 2010), pp. 282–292. ACM, New York (2010)Google Scholar
- 13.Rabin, M.O.: Digitalized Signatures. In: Foundations of Secure Computations, pp. 155–166. Academic Press, London (1978)Google Scholar
- 14.Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011); Also available at Cryptology ePrint Archive, Report 2008/290 CrossRefGoogle Scholar