Abstract
Due to limited resources of actors, third-party auditing has vital significance for ambient intelligence systems, which ensures the integrity of data stored in the information manager. However, Current public key based third-party auditing schemes are costly, while simple MAC based third-party auditing schemes can’t fulfill two security requirements, namely the privacy-preserving and the integrity-against-TPA requirements. Taking both security and efficiency into account, this paper proposes a novel simple MAC based third-party auditing scheme, which is much more efficient than current public key based schemes, while still fulfills the above two security requirements. Therefore, it is feasible to be deployed in ambient intelligence systems.
Similar content being viewed by others
References
Amazon.com (2008) Amazon s3 availability event. http://status.aws.amazon.com/s3-20080720.html
Arrington M (2006a) Email disaster: reports of mass email deletions. http://www.techcrunch.com/2006/12/28/gmail-disaster-reports-of-massemail-deletions
Arrington M (2006b) Apple’s MobileMe Experiences Post-Launch Pain. http://blogs.zdnet.com/projectfailures/?p=908
Ateniese G et al (2007a) Provable data possession at untrusted stores. In: Proc. ACM CCS 2007, CCS ’07, pp 598–609. ACM
Ateniese G et al (2007b) Provable data possession at untrusted stores. In: Proceedings of the ACM CCS2007, CCS ’07, pp 598–609. ACM
Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In Proc. first ACM conf. computer and comm. security (CCS-1993), CCS ’93. ACM
Doctor F, Iqbal R, Naguib RNG (2014) A fuzzy ambient intelligent agents approach for monitoring disease progression of dementia patients. J Ambient Intell Hum Comput 5:147–158
Juels A, Burton J, Kaliski S (2007) Pors: proofs of retrievability for large files. In: Proceedings of the ACM CCS2007, CCS ’07, pp 584–597. ACM
Lynn B, Boneh D, Shacham H (2001) Short signatures from the weil pairing. In Proc. seventh Int conf. theory and application of cryptology and information security: advances in cryptology, Asia-Crypt ’01, pp 514–532. LNCS
Lynn B (2006) PBC Library Manual 0.5.11. http://crypto.stanford.edu/pbc/manual/
Openssl.org (2013) Openssl-1.0.1e.tar.gz. http://www.openssl.org/source/
Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proceedings of the Asia-Crypt2008, Asia-Crypt ’08, pp 891–907. LNCS
Shah MA et al (2007a) Auditing to keep online storage services honest. In Proceedings of the USENIX HotOS, USENIX HotOS ’07. LNCS
Shah MA et al (2007b) Auditing to keep online storage services honest. In: Proc. USENIX HotOS 2007, USENIX HotOS ’07. LNCS
Tapia DI, Abraham A, Corchado JM, Alonso RS (2010) Agents and ambient intelligence: case studies. J Ambient Intell Hum Comput 1:85–93
Wang C et al (2010a) Privacy-preserving public auditing for storage security in cloud computing. In: Proc. IEEE INFOCOM 2010, INFOCOM ’10. IEEE
Wang C et al (2010b) Toward publicly auditable secure cloud data storage services. IEEE Netw 7:7
Wang C et al (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62:362–375
Wan C et al (2014) A xor based public auditing scheme for proof of storage. In: Proc. BWCCA 2014, BWCCA ’14. IEEE
Wang Q et al (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proc. ESORICS 2009, ESORICS ’09, pp 355–370. ACM
Wang Q et al (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 5:14
Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 9:1717–1726
Yan Z et al (2011) Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proc. ACM symp. applied computing 2011, ASAC ’11, pp 1550–1557. ACM
Acknowledgments
This paper is supported by the NSFC (No. 61101088), the Chinese 863 plan (No. 2013AA014001), and the Opening Project of Key Lab of Information Network Security of Ministry of Public Security (No. C13607).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wan, C., Zhang, J., Pei, B. et al. Efficient privacy-preserving third-party auditing for ambient intelligence systems. J Ambient Intell Human Comput 7, 21–27 (2016). https://doi.org/10.1007/s12652-015-0295-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-015-0295-6