Loading…

File changes with security proof stored in cloud service systems

This paper proposes a new scheme in cloud service applied to smart home systems based on the technology of the Internet of Things (IoT), and the key technologies include sensing technology and cloud computing ability. The IoT refers to the network of objects, devices, machines, and other physical sy...

Full description

Saved in:
Bibliographic Details
Published in:Personal and ubiquitous computing 2018-02, Vol.22 (1), p.45-53
Main Authors: Yang, Cheng-Yu, Huang, Cheng-Ta, Wang, Ya-Ping, Chen, Yen-Wen, Wang, Shiuh-Jeng
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This paper proposes a new scheme in cloud service applied to smart home systems based on the technology of the Internet of Things (IoT), and the key technologies include sensing technology and cloud computing ability. The IoT refers to the network of objects, devices, machines, and other physical systems with computing and communication capabilities. On the smart home paradigm, the data collected from sensors can be sensitive information and that security breaches can have devastating economic and social impact. This paper proposes a platform to prevent collusion between users and the cloud service provider (CSP). To protect the privacy of the checked data, the leakage of personnel information in the protocol for the proof must be considered. The proposed protocol can verify users who modify shared files, so that a cloud-storage practice is considered safe. In addition, the proposed method preserves data privacy and minimizes computational cost by applying the bilinearity property of bilinear pairings.
ISSN:1617-4909
1617-4917
DOI:10.1007/s00779-017-1090-5