Data Privacy in Remote Data Integrity Checking for Secure Cloud Storage



Similar documents
Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Research Paper on Data Integrity Checking In Cloud Computing

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Survey Paper on Integrity Auditing of Storage

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Data Security & Availability in Multi-Cloud Storage with Cooperative Provable Data Possession

Data Grid Privacy and Secure Storage Service in Cloud Computing

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Replicated Data Integrity Verification in Cloud

Cloud Data Storage Services Considering Public Audit for Security

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Preserving Data Privacy in Third Party Cloud Audit

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES

Trusted Public Auditing Process for Secure Cloud Storage

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

Near Sheltered and Loyal storage Space Navigating in Cloud

On the security of auditing mechanisms for secure cloud storage

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

How To Ensure Data Integrity In Cloud Computing

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

Enable Public Audit ability for Secure Cloud Storage

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

International Journal of Advance Research in Computer Science and Management Studies

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

Improving data integrity on cloud storage services

Remote Data Auditing Scheme in Secured Cloud Storage Environment

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

Efficient Cloud Computing with Secure Data Storage using AES

Data Storage Security in Cloud Computing

Surveying Cloud Storage Correctness using TPA with BLS

An Efficient Data Correctness Approach over Cloud Architectures

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

Enabling Public Auditing for Secured Data Storage in Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing

Towards a compliance audit of SLAs for data replication in Cloud storage

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Ensuring Data Storage Security in Cloud Computing

Secure Way of Storing Data in Cloud Using Third Party Auditor

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

How To Ensure Data Integrity In Clouds

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

Basrah, 61004, Iraq, Basrah, 61004, Iraq,

A Survey on Secure Storage Services in Cloud Computing

Verifying Correctness of Trusted data in Clouds

Public Auditability and Privacy preserving in Cloud Storage

ADVANCE SECURITY TO CLOUD DATA STORAGE

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

I. Introduction. A. Related Work

EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1)

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.

Recent advances in security and privacy in big data

A Survey on Secure Auditing and Deduplicating Data in Cloud

CHAPTER 8 CLOUD COMPUTING

Transcription:

Data Privacy in Remote Data Integrity Checking for Secure Cloud Storage Yong Yu Centre for Computer and Information Security University of Wollongong Australia 1

Yong Yu, Man Ho Au, Yi Mu, Willy Susilo et al. Enhanced Privacy of a Remote Data Integrity Checking Protocol for Secure Cloud Storage. History of Remote Data Integrity Checking International Journal of Information Security, accepted, Publicly 17 verifiable August, 2014. RICPrivacy in RIC protocols Outline Definition of privacy - IND-Privacy Xinyu Fan, Guomin Yang, Yi Mu and Yong Yu, On Indistinguishability Insecurity of existing publicly in Remote verifiable Data RIC protocols Integrity Checking, The Computer Journal, Oxford (accepted, Provably secure RIC protocols with IND-Privacy 19 Oct. 2013), (online version: doi: 10.1093/comjnl/bxt137) Conclusion

Outline Cloud computing and cloud storage Idea of Ateniese et al s PDP Hao et al. s scheme Privacy in RIC protocols Definition of privacy Zero Knowledge Privacy Our RIC protocols with Zero Knowledge Privacy Conclusion

Cloud Computing: Advantages Cloud computing enjoys a "pay-per-use model for enabling available, convenient and on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. NIST

Cloud Characteristics Cloud Characteristics

Cloud Storage vs. Data Integrity Data flow Data owners Data owners Cloud storage service allows owners to outsource their data to cloud servers for storage and maintenance. Low capital costs on hardware and software, low management and maintenance overheads, universal on-demand data access, etc E.g., Amazon S3. 6

Cloud Storage vs. Data Integrity Data flow Data owners Data owners Loss of physical control However, data outsourcing also eliminates owners ultimate control over their data. The cloud server is not fully trusted. Try to hide data loss incidents in order to maintain their reputation. Might discard the data that have not been or are rarely accessed for monetary reasons. 7

Remote Data Integrity Checking

RSA based PDP (Atenises et al, CCS2007) RSA 101 N=pq, p=2p +1, q=2q +1 ed 1mod (N) pk=(e,n) sk=d d Sign : H(m) mod N Verify : e H(m)mod N

RSA-based Tag mi TagBlock ti t i (H(W ) g m i d ) mod i N

Single Block i (mi,ti) t i (H(W ) g m i d ) mod i N e ti 0 mi e; g H(W ) i m i

Challenge-Response m 1 m 2 m 3 m 4 σ 1 σ 2 σ 3 σ 4 m n σ n Client a1 3 a4 T 1 3 4 n a a n M a1m 1 a3m3 a4m4 anmn e T 0 M e; g a 1 a3 a (W ) (W ) (W ) 4 a H H H H(W ) n 1 3 4 n M

Third Party Auditor Privacy against TPA Security against server Shared Data Flow Data Owner Publicly verifiable RIC Cloud Server

Privacy Analysis of Ateniese et al. s PDP (T,M) a1 3 a4 T t1 t3 t4 t n a a n M a1m 1 a3m3 a4m4 anmn M1 a11m1 a31m3 a41m4 an 1mn M 2 a12m1 a32m3 a42m4 an2m M 3 a13m 1 a33m3 a43m4 an3m M 4 a14m1 a34m3 a44m4 an4m n n n

An improvement due to Hao et al. Zhuo Hao, Sheng Zhong, A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability. IEEE Trans. Knowl. Data Eng. 23(9): 1432-1437 (2011)

An improvement due to Hao et al.

An improvement due to Hao et al.

Privacy Analysis of the Scheme Dictionary Attack!!

Our improvement System Components

Our improvement System Components

Our improvement Soundness

Our improvement Soundness

Our improvement Zero Knowledge Privacy

Our improvement Scheme description

Our improvement Scheme description TagGen: m m1m 2m3 m, t Z n n

Our improvement Scheme description TagGen: m m1m 2m3 m, t Z n n Ivan Damgård, Eiichiro Fujisaki: A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. ASIACRYPT 2002: 125-142

Our improvement Scheme description

Our improvement Scheme description Check:

Our improvement Soundness Proof

Our improvement Soundness Proof

Our improvement Soundness Proof If the response can pass the verification,i.e., Using the oracle replay technique and forking lemma, replay H2 to generate a new response R ; then we can get two pairs of collision for H2, we have

that is

Our improvement ZK privacy proof

Our improvement ZK privacy proof

Our improvement ZK privacy proof

Conclusions Cloud computing has posed new challenges to data integrity Privacy issues in existing RIC protocols is a big issue. Zero Knowledge Privacy was introduced RSA based publicly verifiable RIC protocols fails to achieve Zero Knowledge privacy An improved scheme with ZK privacy was given

Thanks to All