Advanced SearchSearch Tips
Privacy-Preserving Self-Certified Public Auditing for Secure Cloud Storage
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
  • Journal title : Journal of KIISE
  • Volume 43, Issue 4,  2016, pp.497-508
  • Publisher : Korean Institute of Information Scientists and Engineers
  • DOI : 10.5626/JOK.2016.43.4.497
 Title & Authors
Privacy-Preserving Self-Certified Public Auditing for Secure Cloud Storage
Baek, Mokryeon; Kim, Dongmin; Jeong, Ik Rae;
  PDF(new window)
With a cloud storage service, data owners can easily access their outsourced data in cloud storage on different devices and at different locations, and can share their data with others. However, as the users no longer physically have possession of their outsourced data and the cloud still facing the existence of internal/external threats, the task of checking the data integrity is formidable. Over recent years, numerous schemes have been proposed to ensure data integrity in an untrusted cloud. However, the existing public auditing schemes use a third-party auditor(TPA) to execute high computation to check data integrity and may still face many security threats. In this paper, we first demonstrate that the scheme proposed by Zhang et al. is not secure against our two threat models, and then we propose a self-certified public auditing scheme to eliminate the security threats and guarantee a constant communication cost. Moreover, we prove the securities of our public auditing scheme under three security models.
public auditing;privacy preserving;cloud computing;integrity;self certified signature;
 Cited by
클라우드 스토리지 보안 기술 동향,황우민;김성진;김형천;

정보처리학회지, 2016. vol.23. 4, pp.27-35
Amazon S3. [Online]. Available:

Google Cloud Platform [Online]. Available:

Dropbox. [Online]. Available:

M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Communications of the ACM, pp. 50-58, Apr. 2010.

Dropbox wasn't hacked [Online]. Available:

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Ki ssner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-609, 2007.

A. Juels, J. Burton, and S. Kaliski, "PORs: Proofs of Retrievability for Large Files," Proc. ACM Conf. Computer and Comm. Security (CCS '07), pp. 584-597, 2007.

H. Shacham, and, B. Waters, "Compact Proofs of Retrievability," Proc. Int'l Conf. Theory and Application of Cryptology and lnformation Security: Advances in Cryptology (Asiacrypt), pp.90-107, 2008.

J. Yuan, and S. Yu, "Proofs of retrievability with public verifiability and constant communication cost in cloud," Proc. of the 2013 international workshop on Security in cloud computing, pp. 19-26, 2013.

C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage ," IEEE Transactions On Computers, Vol. 62, No.2, pp.362-375, 2013. crossref(new window)

B. Wang, B. Li, and H. Li, "Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud," IEEE Transactions On Services Computing, Vol. 8, No.1, pp.92-106, Feb. 2015. crossref(new window)

J. Zhang, and W. Zeng, "Self-Certified Public Auditing for Data Integrity in Cloud Storage," P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2014 Ninth International Conference on. IEEE, pp.267-273, 2014.

M. Girault, "Self-certified public keys," Advances in Cryptology-EUROCRYPT'91, pp.490-497, 1991.

A. Joux, "The Weil and Tate pairings as building blocks for public key cryptosystems," Algorithmic number theory, pp.20-32, 2002.