ZTE Communications ›› 2011, Vol. 9 ›› Issue (2): 36-38.

• Research Paper • Previous Articles     Next Articles

Privacy-Preserving Protocol for Data Stored in the Cloud

Hongyi Su, Geng Yang, and Dawei Li   

  1. College of Computer Science, Nanjing University of Posts and Telecommunication
  • Online:2011-06-25 Published:2011-06-25
  • About author:Hongyi Su (noman_michael@163.com) is a master’s candidate at the College of Computer Science, Nanjing University of Posts and Telecommunications. His research interests include information security and computer science.

    Geng Yang (yangg@njupt.edu.cn) is a professor and doctoral advisor at the College of Computer Science, Nanjing University of Posts and Telecommunications. He received his Ph.D. degree in computer science from Laval University, Canada. Professor Yang is a member of the IEEE Computer Society and a Standing Member of Chinese Computer Education Society. His research interests include network security, parallel and distributed computing, and mobile computing.

    Dawei Li (lidw1981@163.com) is a Ph.D. candidate at the College of Computer Science, Nanjing University of Posts and Telecommunications. His research interests include computer networks and information security.
  • Supported by:
    The work is supported by the National Natural Science Foundation of China under Grant No. 60873231, the National Basic Research Program of China ( “973”Program) under Grant No. 2011CB302903, the High Education Natural Science Foundation of Jiangsu Province under Grant No. 08KJB520006 and Funds of Key Lab of Fujian Province University Network Security and Cryptology under Grant No. 09A010, and Innovation Project for postgraduate cultivation of Jiangsu Province, China under Grant No. CX10B_195Z.

Abstract: Data storage is an important application of cloud computing. With a cloud computing platform, the burden of local data storage can be reduced. However, services and applications in a cloud may come from different providers, and creating an efficient protocol to protect privacy is critical. We propose a verification protocol for cloud database entries that protects against untrusted service providers. Based on identity-based encryption (IBE) for cloud storage, this protocol guards against breaches of privacy in cloud storage. It prevents service providers from easily constructing cloud storage and forging the signature of data owners by secret sharing. Simulation results confirm the availability and efficiency of the proposed protocol.

Key words: privacy, cloud storage, IBE, secret sharing