Page 69 - Read Online
P. 69

Page 62                                        Jiang et al. J Surveill Secur Saf 2020;1:61-78  I  http://dx.doi.org/10.20517/jsss.2020.09

               the one-way anonymity and the data auditing with mutual supervision are supported, which is necessary for the
               patients and the medical personnel in a real e-health scenario.


               Keywords: Data integrity, stereo storage structure, one-way anonymous




               1  INTRODUCTION
               The development of society is inseparable from the advancement of science and technology. As the huge
               development of the internet industry and the rise of data applications such as artificial intelligence and big
               data spread throughout people’s lives, people begin to generally realize the importance of data. The world is
               gradually stepping into the era of data dominance, and all walks of life are generating data all the time. Due
               to the sheer amount of data that is ever increasing, traditional storage methods cannot meet the needs of
               the people anymore which leads to the emergence of cloud storage.


               Cloud platform provides individuals and organizations with powerful storage services which brings great
               benefits as follows: (1) users only need to pay for the actual storage without worrying about insufficient
               storage resources; (2) with data hosted to cloud platform, local data will no longer be stored, which can
               reduce the purchase cost and energy consumption cost of storage equipment; (3) the maintenance of data
               storage can be left to cloud service providers (CSP) to save the cost of maintaining large amounts of data
               for users; (4) cloud data can form linkage with local data to make redundant backup to each other; and (5)
               users can easily access the data in the cloud through web interface or application.

                                                                                    [1,2]
               While cloud storage has many advantages, there are also some security threats . On the one hand, the
               cloud infrastructure may suffer some inevitable hardware or software failures or external attacks that
               lead to data corruption could occur, but cloud server providers could deliberately hide the fact of data
               corruption for the sake of their business reputation. On the other hand, the outsourced data stored in the
               cloud might suffer from illegal behaviors from CSP for commercial benefits. What is more, the outsourcing
               of data results in users no longer physically owning the data, so users cannot even verify whether their data
               is complete, available, or secure.

               Therefore, how to guarantee the data integrity and the privacy of users on the cloud server has become a
               key issue for cloud storage services. More data security issues are increasingly prominent such as whether
                                                                                    [3-5]
               the user data is securely stored or whether the user privacy is leaked and so on . When it comes to the
               electronic heath system, a physician records the information of patients’ medical treatment electronically
               through electronic health records which involves the collection, quality control, transmission, storage,
               statistics, and utilization of patient information. Obviously, it is difficult for traditional storage methods
               to screen and retrieve typical health records for medical statistics and scientific research. An electronic
               health system can not only retrieve all kinds of medical records quickly, but also make the previously
               laborious process of obtaining medical statistics become very simple and fast, providing first-hand data for
               scientific research and teaching. Nevertheless, such information often contains confidential and sensitive
               information, and the disclosure or falsification of such information may damage the reputation and
               property of patients.

               In order to address these issues, considerable efforts have been made. Among existing proposals, great
                                                                                                    [6-9]
               amounts of cloud data integrity auditing schemes based on privacy protection have been proposed . To
               verify whether the outsourced data remains intact, file owners or auditors can challenge the cloud server
               with low communication overheads and computation costs.
   64   65   66   67   68   69   70   71   72   73   74