Abstract
Secure cloud storage (SCS) guarantees the data outsourced to the cloud to remain intact as it was before being outsourced. Previous schemes to ensure cloud storage reliability are either computationally heavy or admitting long overheads, thus are not suitable for mobile networks with strict computation/bandwidth restrictions. In this paper, we build an efficient SCS system for mobile networks based on homomorphic MAC and propose domain extension to enhance the security level and flexibility of the system. In addition, we give a formal security model which is compatible to previous ones and analyze our system in that model. We also give implementations on mobile devices to verify the effectiveness of our system.
Similar content being viewed by others
References
Deswarte Y, Quisquater J J, Saïdane A. Remote integrity checking—how to trust files stored on untrusted servers. In: Proceedings of Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), Lausanne, 2003. 1–11
Filho D, Barreto P. Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150, 2006. http://eprint.iacr.org/
Naor M, Rothblum G N. The complexity of online memory checking. In: Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005), Pittsburgh, 2005. 573–584
Schwarz T, Miller E. Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, Lisboa, 2006. 12
Ateniese G, Burns R C, Curtmola R, et al. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, 2007. 598–609
Zhu Y, Wang H X, Hu Z X, et al. Efficient provable data possession for hybrid clouds. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, 2010. 756–758
Erway C, Küp¸cü A, Papamanthou C, et al. Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, 2009. 213–222
Juels A, Kaliski B. Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, 2007. 584–597
Shacham H, Waters B. Compact proofs of retrievability. In: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, Australia, 2008. 90–107
Xu J, Chang E. Towards efficient proofs of retrievability. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, Korea, 2012. 79–80
Ateniese G, Kamara S, Katz J. Proofs of storage from homomorphic identification protocols. In: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2009), Tokyo, 2009. 319–333
Bowers K, Juels A, Oprea A. Proofs of retrievability: theory and implementation. In: Proceedings of the ACM Workshop on Cloud Computing Security, Chicago, 2009. 43–54
Dodis Y, Vadhan S, Wichs D. Proofs of retrievability via hardness amplification. In: Proceedings of the 6th Theory of Cryptography Conference (TCC 2009). Berlin: Springer, 2009. 109–127
Ateniese G, Pietro R, Mancini L, et al. Scalable and efficient provable data possession. In: Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2008), Turkey, 2008. 1–10
Ma H, Zhang R. Secure cloud storage for dynamic group: how to achieve identity privacy-preserving and privilege control. In: Proceedings of the 9th International Conference Network and System Security. Berlin: Springer, 2015. 254–267
Wang Q, Wang C, Li J, et al. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security, Saint-Malo, 2009. 355–370
Stefanov E, Dijk M, Juels A, et al. Iris: a scalable cloud file system with efficient integrity checks. In: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC 2012). New York: ACM, 2012. 229–238
Cash D, Küp¸cü A, Wichs D. Dynamic proofs of retrievability via oblivious RAM. In: Advances in Cryptology— EUROCRYPT 2013. Berlin: Springer, 2013. 279–295
Shi E, Stefanov E, Papamanthou C. Practical dynamic proofs of retrievability. In: Proceedigns of ACM Conference on Computer and Communications Security (CCS 2013), Berlin, 2013. 325–336
Guan C, Ren K, Zhang F, et al. Symmetric-key based proofs of retrievability supporting public verification. In: Proceedigns of the 20th European Symposium on Research in Computer Security (ESORICS 2015). Berlin: Springer, 2015. 203–223
Lillibridge M, Elnikety S, Birrell A, et al. A cooperative internet backup scheme. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, San Antonio, 2003. 29–41
Wang C, Chow S, Wang Q, et al. Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput, 2013, 62: 362–375
Yang K, Jia X. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parall Distrib Syst, 2013, 24: 1717–1726
Chen F, Xiang T, Yang Y, et al. Secure cloud storage meets with secure network coding. In: Proceedings of Conference on Computer Communications, Canada, 2014. 673–681
Agrawal S, Boneh D. Homomorphic macs: mac-based integrity for network coding. In: Proceedings of the 7th International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, 2009. 292–305
Cheng C, Jiang T. A novel homomorphic MAC scheme for authentication in network coding. IEEE Commun Lett, 2011, 15: 1228–1230
Shoup V. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332, 2004. http://eprint.iacr.org/
Krawczyk H. Cryptographic extraction and key derivation: the HKDF scheme. In: Proceedings of the 30th Annual Cryptology Conference (CRYPTO 2010). Berlin: Springer, 2010. 631–648
Acknowledgements
This work was supported by Strategic Priority Research Program of the Chinese Academy of Sciences (Grant Nos. XDA06010703, XDA06010701), National Natural Science Foundation of China (Grant Nos. 61472416, 61272478, 61632020), Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-14-002), and CREST, Japan Science and Technolegy Agency.
Author information
Authors and Affiliations
Corresponding author
Additional information
Amazon, http://status.aws.amazon.com/s3us-20080720.html and http://status.aws.amazon.com/s3-20080720.html.
Conflict of interest
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Zhang, R., Ma, H., Lu, Y. et al. Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci. China Inf. Sci. 60, 122104 (2017). https://doi.org/10.1007/s11432-016-0038-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-016-0038-6