Abstract
An auditing scheme is a good way to prove owner’s data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build for the last few years. However, in a public auditing scheme everybody does verification of data and a possibility of leaking some secrete information to the public verifiers is an issue that data owners are unhappywith this scenario. For example, the data owner does not want anybody else to know he has the data stored in the cloud server. Motivated by the issue of privacy associated with public auditing system, we proposed a designated verifier auditing (DVA) scheme based on Steinfeld et al.’s universal designated verifier (DV) signature scheme. Our DVA scheme authorizes a third party auditor with private verification capability. It provides private verification because the scheme involves private key of the verifier. Moreover, we present the batch auditing scheme to improve auditing efficiency. Through rigorous security analysis we showed that our scheme is provably secure in the random oraclemodel assuming that the computational Diffie-Hellman (CDH) problem is hard over the group of bilinear maps.
Similar content being viewed by others
References
Asaar M R, Salmasizadeh M. A pairing based strong designated verifier signature scheme without random oracles. IACR cryptology eprint archive, 2012
Gorantla M C, Boyd C, Nieto J M G. Strong designated verifier signature in a multi-user setting. In: Proceedings of the 7th Australasian Conference on Information Security. 2009, 21–31
Huang Q, Yang G, Wong D S, Susilo W. Efficient strong designated verifier signature schemes without random oracle or with nondelegatability. International Journal of Information Security, 2011, 10(6): 373–385
Huang X, Susilo W, Mu Y, Wu W. Secure universal designated verifier signature without random oracles. International Journal of Information Security, 2008, 7(3): 171–183
Huang X, Susilo W, Mu Y, Zhang F. Short designated verifier signature scheme and its identity-based variant. International Journal of Network Security, 2008, 6(1): 82–93
Steinfeld R, Bull L, Wang H, Pieprzyk J. Universal designated-verifier signatures. In: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security. 2003, 523–542
Juels A, Kaliski Jr B S. PORS: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007, 584–597
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007, 598–609
Ateniese G, Di Pietro R, Mancini L V, Tsudik G. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. 2008, Article 9
Shacham H, Waters B. Compact proofs of retrievability. In: Advances in Cryptology-ASIACRYPT 2008. 2008, 90–107
Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. 2001, 514–532
Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security. 2009, 355–370
Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the 2010 IEEE INFOCOM. 2010, 1–9
Xu C, He X, Abraha-Weldemariam D. Cryptanalysis of wang’s auditing protocol for data storage security in cloud computing. In: Proceedings of the 4th International Conference on Information Computing and Applications. 2012, 422–428
Wang C, Chow S S, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 2011, 1–12
Wang C, Chow S S, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 2013, 62(2): 362–375
Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques. 2003, 416–432
Author information
Authors and Affiliations
Corresponding author
Additional information
Solomon Guadie Worku is a doctorial student at University of Electronic Science and Technology of China (UESTC). He received his MS degree in Mathematics from Addis Ababa University, Ethiopia in 2003 and his BE degree inMathematics from Kotebe College of Teacher Education, Ethiopia in 1998. His research interests include information security, cryptography, and cloud computing security.
Chunxiang Xu received her BS, MS, and PhD degrees at Xidian University, China in 1985, 1988, and 2004 respectively, China. She is currently engaged in information security, cloud computing security, and cryptography as a professor at University of Electronic Science and Technology of China (UESTC).
Jining Zhao received his BS degree in Information and Computing Science at Henan Normal University in 2005, China. He is an MS degree candidate in Information Security at University of Electronic Science and Technology of China (UESTC). His research interests include cloud computing security, network security, and cryptography.
Rights and permissions
About this article
Cite this article
Worku, S.G., Xu, C. & Zhao, J. Cloud data auditing with designated verifier. Front. Comput. Sci. 8, 503–512 (2014). https://doi.org/10.1007/s11704-013-3138-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-013-3138-7