Skip to main content
Log in

Cloud data auditing with designated verifier

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

An auditing scheme is a good way to prove owner’s data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build for the last few years. However, in a public auditing scheme everybody does verification of data and a possibility of leaking some secrete information to the public verifiers is an issue that data owners are unhappywith this scenario. For example, the data owner does not want anybody else to know he has the data stored in the cloud server. Motivated by the issue of privacy associated with public auditing system, we proposed a designated verifier auditing (DVA) scheme based on Steinfeld et al.’s universal designated verifier (DV) signature scheme. Our DVA scheme authorizes a third party auditor with private verification capability. It provides private verification because the scheme involves private key of the verifier. Moreover, we present the batch auditing scheme to improve auditing efficiency. Through rigorous security analysis we showed that our scheme is provably secure in the random oraclemodel assuming that the computational Diffie-Hellman (CDH) problem is hard over the group of bilinear maps.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Asaar M R, Salmasizadeh M. A pairing based strong designated verifier signature scheme without random oracles. IACR cryptology eprint archive, 2012

    Google Scholar 

  2. Gorantla M C, Boyd C, Nieto J M G. Strong designated verifier signature in a multi-user setting. In: Proceedings of the 7th Australasian Conference on Information Security. 2009, 21–31

    Google Scholar 

  3. Huang Q, Yang G, Wong D S, Susilo W. Efficient strong designated verifier signature schemes without random oracle or with nondelegatability. International Journal of Information Security, 2011, 10(6): 373–385

    Article  Google Scholar 

  4. Huang X, Susilo W, Mu Y, Wu W. Secure universal designated verifier signature without random oracles. International Journal of Information Security, 2008, 7(3): 171–183

    Article  Google Scholar 

  5. Huang X, Susilo W, Mu Y, Zhang F. Short designated verifier signature scheme and its identity-based variant. International Journal of Network Security, 2008, 6(1): 82–93

    Google Scholar 

  6. Steinfeld R, Bull L, Wang H, Pieprzyk J. Universal designated-verifier signatures. In: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security. 2003, 523–542

    Google Scholar 

  7. Juels A, Kaliski Jr B S. PORS: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007, 584–597

    Chapter  Google Scholar 

  8. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007, 598–609

    Chapter  Google Scholar 

  9. Ateniese G, Di Pietro R, Mancini L V, Tsudik G. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. 2008, Article 9

    Google Scholar 

  10. Shacham H, Waters B. Compact proofs of retrievability. In: Advances in Cryptology-ASIACRYPT 2008. 2008, 90–107

    Chapter  Google Scholar 

  11. Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. 2001, 514–532

    Google Scholar 

  12. Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security. 2009, 355–370

    Google Scholar 

  13. Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the 2010 IEEE INFOCOM. 2010, 1–9

    Google Scholar 

  14. Xu C, He X, Abraha-Weldemariam D. Cryptanalysis of wang’s auditing protocol for data storage security in cloud computing. In: Proceedings of the 4th International Conference on Information Computing and Applications. 2012, 422–428

    Chapter  Google Scholar 

  15. Wang C, Chow S S, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 2011, 1–12

    Google Scholar 

  16. Wang C, Chow S S, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 2013, 62(2): 362–375

    Article  MathSciNet  Google Scholar 

  17. Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques. 2003, 416–432

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunxiang Xu.

Additional information

Solomon Guadie Worku is a doctorial student at University of Electronic Science and Technology of China (UESTC). He received his MS degree in Mathematics from Addis Ababa University, Ethiopia in 2003 and his BE degree inMathematics from Kotebe College of Teacher Education, Ethiopia in 1998. His research interests include information security, cryptography, and cloud computing security.

Chunxiang Xu received her BS, MS, and PhD degrees at Xidian University, China in 1985, 1988, and 2004 respectively, China. She is currently engaged in information security, cloud computing security, and cryptography as a professor at University of Electronic Science and Technology of China (UESTC).

Jining Zhao received his BS degree in Information and Computing Science at Henan Normal University in 2005, China. He is an MS degree candidate in Information Security at University of Electronic Science and Technology of China (UESTC). His research interests include cloud computing security, network security, and cryptography.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Worku, S.G., Xu, C. & Zhao, J. Cloud data auditing with designated verifier. Front. Comput. Sci. 8, 503–512 (2014). https://doi.org/10.1007/s11704-013-3138-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-013-3138-7

Keywords

Navigation