R&D: Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information
Proposed protocol is built on identity-based cryptography, thus avoiding complex certificate management and validate advantages of proposed protocol through massive theoretical analysis and experimental results.
This is a Press Release edited by StorageNewsletter.com on January 26, 2022 at 2:01 pmIEEE Internet of Things Journal has published an article written by Yang Yang, Yanjiao Chen, School of Information and Security Engineering, Zhongnan University of Economics and Law, Wuhan, China. Yanjiao Chen is is with the College of Electrical Engineering, Zhejiang University, Zhejiang, China, Fei Chen, College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China, and Jing Chen, Computer School, Wuhan University, Wuhan, China.
Abstract: “Remote data integrity auditing ensures the integrity of cloud storage. In practice, cloud users may not want their sensitive data to be exposed to others. Thus, it is meaningful to investigate how to realize data sharing with sensitive information hiding in cloud storage auditing. Up to now, cloud storage has been proven to achieve the sensitive information hiding property through a third-party sanitizer dedicated to sanitize user data, which leads to high outlays on purchasing and maintaining a special server. To meet this challenge, we design a novel cloud storage auditing protocol to support sensitive information hiding without the need of a third-party sanitizer. In addition, our scheme allows data owners to enable or disable other users to access their sensitive information with the help of the cloud that dose not deviate from the agreement during access control. To be specific, only after receiving the delegations from the data owner, the users can compute the valid warrants that can pass the access verification of the cloud. The proposed protocol is built on identity-based cryptography, thus avoiding the complex certificate management. We validate the advantages of the proposed protocol through massive theoretical analysis and experimental results.“