INTERNATIONAL JOURNAL OF APPLIED SCIENCE ENGINEERING & MANAGEMENT, VOL 3, ISSUE 3
ISSN: 2454-9940
IJASEM©2012
Securing Shared Data Integrity in Cloud
Storage with User Revocation
P William, Deepty Dubey
Key Words— Cloud Computing, Data Integrity, Public Auditing, Proxy Re-Signature, Shared Data, Third Party Auditing, User Revocation
—————————— ——————————
1 INTRODUCTION
LOUD service providers manage an enterprise-class infrastructure that offers a scalable, secure and reliable
environment for users, at a much lower marginal cost due to the sharing nature of resources. It is routine for users to
use cloud storage services to share data with others in a team, as data sharing becomes a standard feature in most cloud
storage offerings, including Drop box and Google Docs.
The integrity of data in cloud storage, however, is subject to skepticism and scrutiny, as data stored in an untrusted cloud
can easily be lost or corrupted, due to hardware failures and human errors. To protect the integrity of cloud data, it is best to
perform public auditing by introducing a third party auditor (TPA), who offers its auditing service with more powerful
computation and communication abilities than regular users. The first provable data possession (PDP) mechanism to
perform public auditing is designed to check the correctness of data stored in an untrusted server, without retrieving the
entire data. Moving a step forward, Wang et al. (referred to as WWRL in this paper) is designed to construct a public
auditing mechanism for cloud data, so that during public auditing, the content of private data belonging to a personal user
is not disclosed to the third party auditor
We believe that sharing data among multiple users is perhaps one of the most engaging features that motivate cloud
storage. A unique problem introduced during the process of public auditing for shared data in the cloud is how to preserve
identity privacy from the TPA, because the identities of signers on shared data may indicate that a particular user in the
group or a special block in shared data is a higher valuable target than others. For example, Alice and Bob work together as a
group and share a file in the cloud.
The shared file is divided into a number of small blocks, which are independently signed by users. Once a block in this
shared file is modified by a user, this user needs to sign the new block using her public/private key pair. The TPA needs to
know the identity of the signer on each block in this shared file, so that it is able to audit the integrity of the whole file based
on requests from Alice or Bob. With shared data, once a user modifies a block, she also needs to compute a new signature
for the modified block. Due to the modifications from different users, different blocks are signed by different users. For
security reasons, when a user leaves the group or misbehaves, this user must be revoked from the group.
As a result, this revoked user should no longer be able to access and modify shared data, and the signatures generated by
C
Abstract— In the cloud environment users can easily modify and share data as a group. To ensure shared data integrity can be
verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in Shared data are
generally signed by different users due to data modifications performed by different users. For security reasons, once a user is
revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The
straight forward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user
revocation, is inefficient due to the large size of shared data in the cloud. In this, a public auditing mechanism is proposed for the
integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy re-signatures, we allow the cloud tore-sign
blocks on behalf of existing users during user revocation, so that existing users do not need to download and re-sign blocks by
themselves. In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the
cloud, even if some part of shared data has been re-signed by the cloud. Moreover, our mechanism is able to support batch auditing
by verifying multiple auditing tasks simultaneously.