R&D: Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage
Comparison and evaluation indicate scheme more efficient than existing oblivious storage solutions with aspects of client and cloud workloads, respectively.
This is a Press Release edited by StorageNewsletter.com on November 12, 2020 at 2:18 pmIEEE Transactions on Dependable and Secure Computing has published an article written by Jia-Nan Liu, College of Information Science and Technology & College of Cyber Security, Jinan University, 47885 Guangzhou, Guangdong China, Xizhao Luo, School of Computer Science and Technology, Soochow University, 12582 Suzhou, Jiangsu China, Department of Computer Science, Jinan University, 47885 Guangzhou, Guangdong China, Jian Weng, Anjia Yang, College of Information Science and Technology, Jinan University, 47885 Guangzhou, Guangdong China 510632, Xu An Wang, Institute of Information Security, Chinese People’s Armed Police Force Engineering University, 105869 Xi’an, Sichuan China, Ming Li, College of Information Science and Technology, Jinan University, 47885 Guangzhou, Guangdong China, and Xiaodong Lin, School of Computer Science, University of Guelph, 3653 Guelph, Ontario Canada N1G 2W1.
Abstract: “Mobile cloud storage (MCS) provides clients with convenient cloud storage service. In this paper, we propose an efficient, secure and privacy-preserving mobile cloud storage scheme, which protects the data confidentiality and privacy simultaneously, especially the access pattern. Specifically, we propose an oblivious selection and update (OSU) protocol as the underlying primitive of the proposed mobile cloud storage scheme. OSU is based on onion additively homomorphic encryption with constant encryption layers and enables the client to obliviously retrieve an encrypted data item from the cloud and update it with a fresh value by generating a small encrypted vector, which significantly reduces the client’s computation as well as the communication overheads. Compared with previous works, our presented work has valuable properties, such as fine-grained data structure (small item size), lightweight client-side computation (a few of additively homomorphic operations) and constant communication overhead, which make it more suitable for MCS scenario. Moreover, by employing the “verification chunks” method, our scheme can be verifiable to resist malicious cloud. The comparison and evaluation indicate that our scheme is more efficient than existing oblivious storage solutions with the aspects of client and cloud workloads, respectively.“