Computers & Security 95 (2020) 101847 Contents lists available at ScienceDirect Computers & Security journal homepage: www.elsevier.com/locate/cose Cloud data integrity verification scheme for associated tags Junfeng Tian a,b , Xuan Jing a,b, a School of Cyber Security and Computer, Hebei University, Baoding 071000, China b Key Lab on High Trusted Information System in Hebei Province, Baoding 071000, China a r t i c l e i n f o Article history: Received 18 September 2019 Revised 14 March 2020 Accepted 19 April 2020 Available online 27 April 2020 Keywords: Electronic health records Operation logs Verification tags Integrity verification a b s t r a c t In typical cloud storage systems such as storage systems for electronic health records (EHRs), users must regularly update sensitive files that are stored in the cloud. Leakage of the operation logs (OLs) will cause severe damage to users. Therefore, it is critical to develop secure auditing techniques for verifying users OLs. Under this scenario, we propose a novel auditing scheme that realizes secure detection for users OLs. In this design, the OLs are grouped according to the types of operations, the verification tags (VTs) of the OLs are calculated by associating an operation relationship, and the cloud data integrity verifica- tion is realized by randomly detecting the correctness of VTs. We introduce a homomorphic hash function into the integrity verification of the OLs, and the verification result for the sensitive information is de- rived from the verification result for the public information, thereby realizing stronger privacy protection. Furthermore, our scheme also achieves efficient handling of data dynamics. The security analysis and experimental verification indicate that our scheme is secure and efficient. © 2020 Elsevier Ltd. All rights reserved. 1. Introduction With the development of networks and the continual progress of science and technology, the scale of data in real life continues to increase. As a result, increasingly many users choose to store large amounts of data in the cloud computing platform, and the cloud storage technology is a concept that is derived from cloud comput- ing services Ren et al. (2012). Through cloud storage systems, users can outsource their data to cloud servers, thereby reducing their storage burden on the local hardware. Currently, many cloud ser- vice providers (e.g., AWS, Azure, and Google Cloud) provide cloud storage as one of their main services. However, in contrast to traditional local storage technologies, users lose physical control of their data when using cloud storage. The data that are stored in the cloud might be corrupted or lost due to unavoidable software errors, hardware failures, external ma- licious attacks and damage from cloud service providers. According to a survey that was conducted by Gartner in 2009, 70% of the CEOs of the surveyed companies refused to adopt cloud comput- ing models on a large scale due to concerns about the privacy of cloud data 2 (2018). Furthermore, in recent years, the security stor- age problem that has been exposed by cloud operators has aroused people’s concerns. For example, Amazon EC2 permanently deleted Corresponding author at: School of Cyber Security and Computer, Hebei Univer- sity, Baoding 071000, China E-mail address: abidble@gmail.com (X. Jing). data Ristenpart et al. (2009) and Gmail suffered from data loss 4 (2018). Therefore, the realization of the secure storage of cloud data is an urgent problem to be solved. To this end, researchers proposed the provable data possession (PDP) Ateniese et al. (2007) and the proofs of retrievability (POR) Juels and Kaliski (2007). However, in practice, for some common cloud storage systems, such as electronic health record (EHR) sys- tems, users must update sensitive data on a regular basis, and leaking of the operation logs (OLs) would cause serious damage to users. Therefore, it is necessary to implement integrity verifica- tion of user OLs while ensuring the privacy and security of sensi- tive data Sun and Fang (2010). We divide the verification tags (VTs) into two parts, namely, authentication tags (ATs) and sensitive tags (STs), and we verify the integrity of the OLs by detecting the cor- rectness of the tags. The authentication tag (AT) refers to the op- eration log (OL) tag of public information such as the user num- ber and the doctor number. The sensitive tag (ST) refers to the OL tag of sensitive information such as the user’s name and condition. Since disease data change frequently, as the frequency of updat- ing these sensitive data increases, the cost of calculating STs also increases. To reduce the verification overhead of such a system, the num- ber of verifications of the STs can be increased, or the number of verifications of the ATs can be reduced and balanced according to the application requirements Tian et al. (2015). However, due to the recalculation of tags after the insertion or deletion of data, N copies of VTs will be calculated after N updates, and when the https://doi.org/10.1016/j.cose.2020.101847 0167-4048/© 2020 Elsevier Ltd. All rights reserved.