TY - JOUR
T1 - A general framework to design secure cloud storage protocol using homomorphic encryption scheme
AU - Zhang, Jian
AU - Yang, Yang
AU - Chen, Yanjiao
AU - Chen, Jing
AU - Zhang, Qian
N1 - Publisher Copyright:
© 2017 Elsevier B.V.
PY - 2017/12/24
Y1 - 2017/12/24
N2 - With the growing popularity of cloud storage, to guarantee the security of outsourced data becomes more and more important. In this paper, we make the first attempt to explore the intrinsic relationship between secure cloud storage and homomorphic encryption scheme, based on which we present a Generic way to design a Secure Cloud Storage protocol, denoted as G-SCS, using any homomorphic encryption scheme (HES). The proposed G-SCS is secure under a definition that satisfy the security requirement of cloud storage. To address various issues in real application scenarios, we further extend the protocol to support deterministic and randomized auditing, data dynamics (i.e., data insertion, deletion and modification), as well as third-party public auditing, while preserving the efficiency and security of the protocol. By instantiating all abstract semantics in G-SCS, we construct three concrete secure cloud storage protocols using RSA-based, Paillier-based and DGHV-based HESs, which are multiplicatively, additively and fully HESs, respectively. We conduct extensive theoretical analysis and experimental evaluations to validate the practicability of the proposed protocol.
AB - With the growing popularity of cloud storage, to guarantee the security of outsourced data becomes more and more important. In this paper, we make the first attempt to explore the intrinsic relationship between secure cloud storage and homomorphic encryption scheme, based on which we present a Generic way to design a Secure Cloud Storage protocol, denoted as G-SCS, using any homomorphic encryption scheme (HES). The proposed G-SCS is secure under a definition that satisfy the security requirement of cloud storage. To address various issues in real application scenarios, we further extend the protocol to support deterministic and randomized auditing, data dynamics (i.e., data insertion, deletion and modification), as well as third-party public auditing, while preserving the efficiency and security of the protocol. By instantiating all abstract semantics in G-SCS, we construct three concrete secure cloud storage protocols using RSA-based, Paillier-based and DGHV-based HESs, which are multiplicatively, additively and fully HESs, respectively. We conduct extensive theoretical analysis and experimental evaluations to validate the practicability of the proposed protocol.
KW - Data dynamics
KW - Homomorphic encryption scheme
KW - Secure cloud storage
KW - Third-party public auditing
UR - https://www.webofscience.com/wos/woscc/full-record/WOS:000418627600004
UR - https://openalex.org/W2748620559
UR - https://www.scopus.com/pages/publications/85029378965
U2 - 10.1016/j.comnet.2017.08.019
DO - 10.1016/j.comnet.2017.08.019
M3 - Journal Article
SN - 1389-1286
VL - 129
SP - 37
EP - 50
JO - Computer Networks
JF - Computer Networks
ER -