NaEPASC:a novel and efficient public auditing scheme for cloud data

被引:3
|
作者
Shuang TAN
Yan JIA
机构
[1] SchoolofComputer,NationalUniversityofDefenseTechnology
关键词
D O I
暂无
中图分类号
TP308 [机房];
学科分类号
摘要
Cloud computing is deemed the next-generation information technology(IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applications with high quality guaranteed. However, cloud users no longer possess their data in a local data storage infrastructure,which would result in auditing for the integrity of outsourced data being a challenging problem, especially for users with constrained computing resources. Therefore, how to help the users complete the verification of the integrity of the outsourced data has become a key issue. Public verification is a critical technique to solve this problem, from which the users can resort to a third-party auditor(TPA) to check the integrity of outsourced data. Moreover,an identity-based(ID-based) public key cryptosystem would be an efficient key management scheme for certificatebased public key setting. In this paper, we combine ID-based aggregate signature and public verification to construct the protocol of provable data integrity. With the proposed mechanism, the TPA not only verifies the integrity of outsourced data on behalf of cloud users, but also alleviates the burden of checking tasks with the help of users' identity. Compared to previous research, the proposed scheme greatly reduces the time of auditing a single task on the TPA side. Security analysis and performance evaluation results show the high efficiency and security of the proposed scheme.
引用
收藏
页码:794 / 804
页数:11
相关论文
共 50 条
  • [41] Third Party Public Auditing scheme for Cloud Storage
    More, Swapnali
    Chaudhari, Sangita
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 69 - 76
  • [42] On the Security of a Public Auditing Protocol for Shared Data with Efficient User Revocation in the Cloud
    Ma, FangChao
    Li, Hechao
    Guo, Hua
    Xia, ChunHe
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1647 - 1655
  • [43] Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage
    Yan, Hao
    Liu, Yanan
    Zhang, Zheng
    Wang, Qian
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [44] Efficient ID-based public auditing for the outsourced data in cloud storage
    Zhang, Jianhong
    Dong, Qiaocui
    INFORMATION SCIENCES, 2016, 343 : 1 - 14
  • [45] An efficient and secure public batch auditing protocol for dynamic cloud storage data
    Yang, Liu
    Xia, Lili
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 671 - 675
  • [46] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    Yang Zhen
    Wang Wenyu
    Huang Yongfeng
    Li Xing
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (01) : 179 - 187
  • [47] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    YANG Zhen
    WANG Wenyu
    HUANG Yongfeng
    LI Xing
    ChineseJournalofElectronics, 2019, 28 (01) : 179 - 187
  • [48] Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
    Yuan, Yilin
    Gu, Yifan
    Zhang, Zhenzhen
    International Journal of Network Security, 2023, 25 (04) : 609 - 619
  • [49] Enable data privacy, dynamics, and batch in public auditing scheme for cloud storage system
    Yuan, Yilin
    Zhang, Jianbiao
    Xu, Wanshan
    Li, Zheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (10):
  • [50] Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage
    Ming, Yang
    Zhang, Weixin
    Liu, Hang
    Wang, Chenhao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 143