Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage

被引:1
|
作者
Deng, Lunzhi [1 ]
Feng, Shuai [1 ]
Wang, Tao [1 ]
Hu, Zhenyu [1 ]
Li, Siwei [2 ]
机构
[1] Guizhou Normal Univ, Sch Math Sci, Guiyang 550001, Peoples R China
[2] Guizhou Normal Univ, Grad Sch, Guiyang 550001, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; data auditing; identity-based cryptography; standard model; DATA POSSESSION; EFFICIENT; CHECKING;
D O I
10.1109/TDSC.2023.3336994
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a data auditing scheme, the data owner authorizes a third-party auditor (TPA) to check whether the data stored in the cloud remains intact. Researchers have given many data auditing schemes. However, there are still three significant shortcomings in these schemes. First of all, the security proofs of these schemes are completed in the random oracle model (ROM). As we all know, a scheme with provably security in ROM may be insecure in practical applications. Second, TPA in most known schemes is set to be completely reliable. However, TPA in reality may attempt to extract the data owner's data. These schemes cannot resist the malicious behavior of TPA. Third, most known schemes require hash-to-point operations and enjoy high computation cost, so they are not suitable for computing-constrained environments. In this article, we first presented the system model and security demands for an identity-based data auditing (IBDA) scheme. We then came up with a new IBDA scheme and showed the security proofs in the standard model (SM). Finally, we made an analysis on performance for seven data auditing schemes. In our scheme, the computation cost required by TPA is a constant, independent of the number of data blocks participating in the challenge. Therefore, our scheme requires low computation cost and is suitable for computing-constrained environments.
引用
收藏
页码:3644 / 3655
页数:12
相关论文
共 50 条
  • [41] Identity-Based Integrity Verification and Public Auditing Scheme in Cloud Storage System Against Malicious Auditors
    Zhang, Haojue
    Yuan, Yilin
    Xin, Xianwei
    Qu, Yanbo
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2023, 30 (02): : 408 - 415
  • [42] Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
    Zhang, Xiaojun
    Wang, Huaxiong
    Xu, Chunxiang
    INFORMATION SCIENCES, 2019, 472 : 223 - 234
  • [43] Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
    Zhang, Yue
    Yu, Jia
    Hao, Rong
    Wang, Cong
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 608 - 619
  • [44] Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 356 - 365
  • [45] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [46] Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage"
    Peng, Su
    Zhou, Fucai
    Xu, Jian
    Xu, Zifeng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2016, 9 (06) : 996 - 998
  • [47] Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
    Yuan, Yilin
    Gu, Yifan
    Zhang, Zhenzhen
    International Journal of Network Security, 2023, 25 (04) : 609 - 619
  • [48] Enabling identity-based cloud storage public auditing with quantum computers resistance
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (01) : 82 - 98
  • [49] Identity-based provable data possession revisited: Security analysis and generic construction
    Liv, Hongyu
    Mu, Yi
    Zhao, Jining
    Xu, Chunxiang
    Wang, Huaqun
    Chen, Leiting
    Yu, Yong
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 10 - 19
  • [50] Identity-Based Batch Provable Data Possession
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    Xu, Zifeng
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 112 - 129