Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage

被引:1
|
作者
Deng, Lunzhi [1 ]
Feng, Shuai [1 ]
Wang, Tao [1 ]
Hu, Zhenyu [1 ]
Li, Siwei [2 ]
机构
[1] Guizhou Normal Univ, Sch Math Sci, Guiyang 550001, Peoples R China
[2] Guizhou Normal Univ, Grad Sch, Guiyang 550001, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; data auditing; identity-based cryptography; standard model; DATA POSSESSION; EFFICIENT; CHECKING;
D O I
10.1109/TDSC.2023.3336994
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a data auditing scheme, the data owner authorizes a third-party auditor (TPA) to check whether the data stored in the cloud remains intact. Researchers have given many data auditing schemes. However, there are still three significant shortcomings in these schemes. First of all, the security proofs of these schemes are completed in the random oracle model (ROM). As we all know, a scheme with provably security in ROM may be insecure in practical applications. Second, TPA in most known schemes is set to be completely reliable. However, TPA in reality may attempt to extract the data owner's data. These schemes cannot resist the malicious behavior of TPA. Third, most known schemes require hash-to-point operations and enjoy high computation cost, so they are not suitable for computing-constrained environments. In this article, we first presented the system model and security demands for an identity-based data auditing (IBDA) scheme. We then came up with a new IBDA scheme and showed the security proofs in the standard model (SM). Finally, we made an analysis on performance for seven data auditing schemes. In our scheme, the computation cost required by TPA is a constant, independent of the number of data blocks participating in the challenge. Therefore, our scheme requires low computation cost and is suitable for computing-constrained environments.
引用
收藏
页码:3644 / 3655
页数:12
相关论文
共 50 条
  • [31] Identity-Based Dynamic Data Auditing for Big Data Storage
    Shang, Tao
    Zhang, Feng
    Chen, Xingyue
    Liu, Jianwei
    Lu, Xinxi
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (06) : 913 - 921
  • [32] Identity-Based Distributed Provable Data Possession in Multicloud Storage
    Wang, Huaqun
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (02) : 328 - 340
  • [33] Incentive Public Auditing Scheme with Identity-Based Designated Verifier in Cloud
    Shao, Bilin
    Zhang, Li
    Bian, Genqing
    ELECTRONICS, 2023, 12 (06)
  • [34] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [35] An identity-based cryptographic scheme for cloud storage applications
    Medhioub, Manel
    Hamdi, Mohamed
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (02) : 93 - 104
  • [36] An Efficient Provable Secure Public Auditing Scheme for Cloud Storage
    Xu, Chunxiang
    Zhang, Yuan
    Yu, Yong
    Zhang, Xiaojun
    Wen, Junwei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4226 - 4241
  • [37] Identity-based key management scheme with provable security for wireless sensor networks
    Zhou, Nanrun
    Jiang, Qiongxi
    Chen, Xun
    Journal of Information and Computational Science, 2011, 8 (14): : 3075 - 3081
  • [38] Identity-based data storage in cloud computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 673 - 681
  • [39] An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme
    Chin, Ji-Jian
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Phan, Raphael C. -W.
    2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 27 - 32
  • [40] Certificateless encryption scheme with provable security in the standard model suitable for mobile devices
    Deng, Lunzhi
    Feng, Shuai
    Chen, Zhiwei
    INFORMATION SCIENCES, 2022, 613 : 228 - 238