An efficient ID-based message recoverable privacy-preserving auditing scheme


One of the most important benefits of public cloud storage is outsourcing of management and maintenance with easy accessibility and retrievability over the internet. However, outsourcing data on the cloud brings new challenges such as integrity verification and privacy of data. More concretely, once the users outsource their data on the cloud they have no longer physical control over the data and this leads to the integrity protection issue. Hence, it is crucial to guarantee proof of data storage and integrity of the outsourced data. Several pairing-based auditing solutions have been proposed utilizing the Boneh-Lynn-Shacham (BLS) short signatures. They basically provide a desirable and efficient property of non-repudiation protocols. In this work, we propose the first ID-based privacy-preserving public auditing scheme with message recoverable signatures. Because of message recoverable auditing scheme, the message itself is implicitly included during the verification step that was not possible in previously proposed auditing schemes. Furthermore, we point out that the algorithm suites of existing schemes is either insecure or very inefficient due to the choice of the underlying bilinear map and its baseline parameter selections. We show that our scheme is more efficient than the recently proposed auditing schemes based on BLS like short signatures.

DOI: 10.1109/PST.2015.7232962

Extracted Key Phrases

4 Figures and Tables

Cite this paper

@article{Kiraz2015AnEI, title={An efficient ID-based message recoverable privacy-preserving auditing scheme}, author={Mehmet Sabir Kiraz and Isa Sertkaya and Osmanbey Uzunkol}, journal={2015 13th Annual Conference on Privacy, Security and Trust (PST)}, year={2015}, pages={117-124} }