SARRC: Secure Auditing and Re-signing of Revoked Customer Chunks by Cloud Using Regression Method

C. M. Geeta, Usharani, R. G. Shreyas Raju, S. Raghavendra, Rajkumar Buyya, K. R. Venugopal, S. S. Iyengar, L. M. Patnaik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The demand of deploying information has enormously increased within the last decade. Numerous distributed computing service suppliers have emerged (for eg., Microsoft Azure, Dropbox) in order to satisfy the requirements for information repository and high performance computation. The customers using the cloud repository services can conveniently arrange as a cluster and distribute information among themselves. Information proprietor computes the signatures for every chunk and deploys in the distributed server in order to allow the public verifier to perform public integrity verification on the information stored on the cloud server. In Panda scheme [1], by using the proxy re-signatures, Cloud Service Provider (CSP) verifies and re-signs the revoked customer chunks in favor of the existing customers. The malicious CSP might use the Resign key deliberately to transform the signature of one customer to another. Apart from this, conspiracy amidst the mischievous cloud server and the repudiated customer reveals the private key information of the customers present in the cluster. We propose Secure Auditing and Re-signing of Revoked Customer Chunks by Cloud Using Regression Method. Re-key computed by the information proprietor using regression method is highly secure and the mischievious cloud cannot detect the private information of the customers in the cluster. Our mechanism is collusion resistant, reduces computation cost of re-sign key by information proprietor and in addition CSP securely performs auditing and re-signing of repudiated customer chunks.

Original languageEnglish
Title of host publication14th International Conference on Information Processing
Subtitle of host publicationInternet of Things, ICInPro 2018 - Proceedings
EditorsK. R. Venugopal, P. Deepa Shenoy, K. B. Raja, Rajkumar Buyya, S. S. Iyengar, L. M. Patnaik
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538677964
DOIs
Publication statusPublished - 12-2018
Event14th International Conference on Information Processing, ICInPro 2018 - Bengaluru, India
Duration: 21-12-201823-12-2018

Publication series

Name14th International Conference on Information Processing: Internet of Things, ICInPro 2018 - Proceedings

Conference

Conference14th International Conference on Information Processing, ICInPro 2018
Country/TerritoryIndia
CityBengaluru
Period21-12-1823-12-18

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'SARRC: Secure Auditing and Re-signing of Revoked Customer Chunks by Cloud Using Regression Method'. Together they form a unique fingerprint.

Cite this