Cryptology ePrint Archive: Report 2009/579

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang and Sherman S.-M. Chow and Qian Wang and Kui Ren and Wenjing Lou

Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.

Category / Keywords: cryptographic protocols, homomorphic authenticator, proof of storage, privacy-preserving, data integrity auditing.

Publication Info: Preliminary version appeared in INFOCOM 2010

Date: received 29 Nov 2009, last revised 15 Apr 2010

Contact author: cong at ece iit edu

Available format(s): PDF | BibTeX Citation

Note: New version includes one new author, and presents significantly improved constructions and a complete rewrite and evaluation of our preliminary work that appeared in INFOCOM 2010.

Version: 20100416:010919 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]