Page 71 - Read Online
P. 71

Page 64                                        Jiang et al. J Surveill Secur Saf 2020;1:61-78  I  http://dx.doi.org/10.20517/jsss.2020.09

               firstly put forward a notion of Provable Data Possession to confirm the outsourced data possession on the
               untrusted cloud, which is based on RSA homomorphic linear verification and supports third-party public
               auditing. However, the dynamic update of data is not supported in this scheme, and this scheme cannot
                                                           [14]
               protect users’ privacy. In the same year, Juels et al.  proposed a model named Proof of Retrievability, as
               well as presented a practical scheme which supports the integrity verification of data and the recovery of
               damaged data. Nevertheless, this scheme has a limited number of times to verify data integrity and does
               not support dynamic auditing or batch auditing. Since then, to solve the aforementioned problems, many
               scholars have devoted themselves to making improvements based on these two schemes, and they have
               made great progress in supporting more performance such as batch auditing, operating efficiency, and
               dynamic data update. Nevertheless, few people paid attention to the problem that these schemes leak users’
                                                                                        [15]
               private data to third-party auditors in the process of auditing. In 2010, Wang et al.  first proposed an
               auditing scheme that can be publicly verified to support user privacy protection. This scheme is based on
               public key homomorphic label technology so that the auditor can perform auditing without obtaining all
               the data of the user which greatly increases the operating efficiency of the system. The scheme also uses
               a random masking technique which makes it impossible for third party auditors to obtain users’ private
               information through the verification returned by cloud service providers. In addition, the auditing protocol
               supports dynamic update of data, batch auditing, and multiple auditing tasks that can be performed
                                                                                                        [16]
               simultaneously. It was later confirmed that there were still security risks. Therefore, in 2011, Wang et al.
               improved the system for the security but caused a huge computing burden on the cloud server, greatly
                                                                                            [17]
               reducing the efficiency of system operation. In terms of this problem, in 2015, Worku et al.  increased the
               efficiency of system operation while ensuring data security, but unfortunately, it did not support dynamic
               data operations.

               Besides storage data, users would like to perform updates to outsourced data directly in the cloud. Based
                                [18]
               on this, Wang et al.  proposed a relatively complete protocol which can support data update, user privacy
               protection, and batch auditing, but it will lead to the problem of high computing cost on the client side.
                              [19]
               Then, Garg et al.  designed a protocol that can minimize the computational complexity for the client
               during the system setup phase, which is publicly verifiable and supports dynamic operations on data.


               After that, many multi-user modification and user revocation schemes have been proposed [20-23] . However,
                                                                                                       [24]
               the above scheme cannot solve the problem of data redundancy well. To solve that problem, Wu et al. ,
                                 [25]
               Daniel and Vasanthi  removed redundant data from the cloud server which saved the storage cost of
               cloud service providers and greatly improved the efficiency of data validation. However, none of the above
                                                                                            [26]
               schemes have been designed specifically for images stored on the cloud, thus Tang et al.  proposed an
               efficient real-time integrity auditing protocol specially designed for cloud images, which also supported
                                                                                     [27]
               fair arbitration. In 2019, based on a new primitive fuzzy identity, Zhao et al.  presented a dynamic
               auditing protocol for the integrity verification of big data. This scheme applies fuzzy identity to the integrity
               verification of big data for the first time.

               However, the above existing solutions cannot be well applied to the e-health systems due to the special
               relationship between medical staff and patients, and the particularity of medical data. Therefore, we explore
               a novel storage structure for storing medical data for the e-health system and design a one-way anonymous
               auditing protocol in this paper.

               1.3  Organization
               The rest of this paper consists of the following parts: We first introduce the preliminaries in Section 2,
               mainly including some definitions and basic properties about bilinear pairing and one-way anonymous key
               agreement required for this paper. Then, we describe the system architecture that contains the proposed
               system model, system components, and stereo storage structure in Section 3. In Section 4, we formalize
   66   67   68   69   70   71   72   73   74   75   76