A Secure Certificate-Based Data Integrity Auditing Protocol with Cloud Service Providers

被引:0
|
作者
Tian, Yuan [1 ]
Zhou, Xuan [1 ]
Zhou, Tanping [1 ]
Zhong, Weidong [1 ]
Li, Ruifeng [1 ]
Yang, Xiaoyuan [1 ]
机构
[1] Chinese Peoples Armed Police Force Engn Univ, Xian 710086, Peoples R China
基金
中国国家自然科学基金;
关键词
certificate-based cryptography; cloud auditing protocol; data integrity auditing; homomorphic verifiable tags (HVTs); forgery method; PROVABLE DATA POSSESSION; SCHEME; PROOFS;
D O I
10.3390/math12131964
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
With the surge in cloud storage popularity, more individuals are choosing to store large amounts of data on remote cloud service providers (CSPs) to save local storage resources. However, users' primary worries revolve around maintaining data integrity and authenticity. Consequently, several cloud auditing methods have emerged to address these concerns. Many of these approaches rely on traditional public-key cryptography systems or are grounded in identity-based cryptography systems or certificateless cryptography systems. However, they are vulnerable to the increased costs linked with certificate management, key escrow, or the significant expenses of establishing a secure channel, respectively. To counter these limitations, Li et al. introduced a certificate-based cloud auditing protocol (LZ22), notable for its minimal tag generation overhead. Nonetheless, this protocol exhibits certain security vulnerabilities. In this paper, we devise a counterfeiting technique that allows the CSP to produce a counterfeit data block with an identical tag to the original one. Our counterfeiting method boasts a 100% success rate for all data block and operates with exceptional efficiency. The counterfeiting process for a single block of 10 kB, 50 kB, and 100 kB takes a maximum of 0.08 s, 0.51 s, and 1.04 s, respectively. By substituting the exponential component of homomorphic verifiable tags (HVTs) with non-public random elements, we formulate a secure certificate-based cloud auditing protocol. In comparison to the LZ22 protocol, the average tag generation overhead of our proposed protocol is reduced by 6.80%, 13.78%, and 8.66% for data sizes of 10 kB, 50 kB, and 100 kB, respectively. However, the auditing overhead of our proposed protocol shows an increase. The average overhead rises by 3.05%, 0.17%, and 0.45% over the LZ22 protocol's overhead for data sizes of 10 kB, 50 kB, and 100 kB, correspondingly.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] An Efficient Certificate-Based Data Integrity Auditing Protocol for Cloud-Assisted WBANs
    Li, Yumei
    Zhang, Futai
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 11513 - 11523
  • [2] Security-Enhanced Certificate-Based Remote Data Integrity Batch Auditing for Cloud-IoT
    Wang, Wenhao
    Sun, Yinxia
    Li, Yumei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [3] A Compressive Integrity Auditing Protocol for Secure Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (03) : 1197 - 1209
  • [4] Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
    Chen, Liqing
    Li, Jiguo
    Lu, Yang
    Zhang, Yichen
    [J]. INFORMATION SCIENCES, 2020, 538 : 273 - 289
  • [5] Dynamic data integrity auditing for secure outsourcing in the cloud
    Wei, Jinxia
    Zhang, Ru
    Liu, Jianyi
    Li, Jing
    Niu, Xinxin
    Yao, Yuangang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12):
  • [6] Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage
    Yu, Yong
    Li, Yannan
    Yang, Bo
    Susilo, Willy
    Yang, Guomin
    Bai, Jian
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 377 - 390
  • [7] An efficient data integrity auditing protocol for cloud computing
    Garg, Neenu
    Bawa, Seema
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 306 - 316
  • [8] Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage
    Wang, Feng
    Xu, Li
    Choo, Kim-Kwang Raymond
    Zhang, Yuexin
    Wang, Huaqun
    Li, Jiguo
    [J]. IEEE ACCESS, 2020, 8 : 2258 - 2271
  • [9] Secure Vehicle-to-roadside Communication Protocol Using Certificate-based Cryptosystem
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    [J]. IETE TECHNICAL REVIEW, 2010, 27 (03) : 214 - 219
  • [10] A Certificate-Based AKA Protocol Secure Against Public Key Replacement Attacks
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (04) : 754 - 765