Cross-domain data cloud storage auditing scheme based on certificateless cryptography

被引:0
|
作者
Yan X. [1 ,2 ]
Zheng L. [1 ,2 ]
Long D. [1 ,2 ]
Rui X. [3 ]
机构
[1] School of Computer Science and Technology, Anhui University, Hefei
[2] Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei
[3] School of Computer, University of Geosciences (Wuhan), Wuhan
基金
中国国家自然科学基金;
关键词
Certificateless cryptography; Cloud storage auditing; Cross-domain; Internet of things (IoT);
D O I
10.19682/j.cnki.1005-8885.2021.1023
中图分类号
学科分类号
摘要
With the development of Internet of things (IoT), more and more intelligent terminal devices outsource data to cloud servers (CSs). However, the CS is not fully trusted, and the heterogeneity among different domains makes it difficult for third-party auditor (TPA) to conduct an efficient integrity auditing of outsourced data. Therefore, the cross-domain data cloud storage auditing scheme based on certificateless cryptography is proposed, which can effectively avoid the big burden of certificate management or key escrow problems in identity-based cryptography. At the same time, TPA can effectively audit the integrity of outsourced data in different domains. Formal security proof and analysis show that the cloud storage auditing scheme satisfies the security and privacy requirements. Performance analysis demonstrates that the efficiency is acceptable. © 2021, Beijing University of Posts and Telecommunications. All rights reserved.
引用
收藏
页码:36 / 47
页数:11
相关论文
共 50 条
  • [31] Certificateless Remote Data Integrity Auditing with Access Control of Sensitive Information in Cloud Storage
    Bian, Genqing
    Zhang, Fan
    Li, Rong
    Shao, Bilin
    [J]. ELECTRONICS, 2022, 11 (19)
  • [32] Cross-domain Resemblance Detection based on Meta-learning for Cloud Storage
    Li, Baisong
    Tian, Wenlong
    Li, Ruixuan
    Xiao, Weijun
    Fu, Zhongming
    Ye, Xuming
    Duan, Renjiao
    Li, Yusheng
    Xu, Zhiyong
    [J]. 2022 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, IPCCC, 2022,
  • [33] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [34] Division and Replication for data with public auditing scheme for cloud storage
    Salunkhe, Sujata D.
    Patil, Dhanshri
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [35] A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
    Tian, Junfeng
    Jing, Xuan
    [J]. IEEE ACCESS, 2019, 7 : 68071 - 68082
  • [36] A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
    Singh, Premlata
    Saroj, Sushil Kr
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 695 - 700
  • [37] A secure and efficient remote data auditing scheme for cloud storage
    El Ghoubach, Imad
    Ben Abbou, Rachid
    Mrabti, Fatiha
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (05) : 593 - 599
  • [38] Cross-Domain based Data Sharing Scheme in Cooperative Edge Computing
    Fan, Kai
    Pan, Qiang
    Wang, Junxiong
    Liu, Tingting
    Li, Hui
    Yang, Yintang
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2018, : 87 - 92
  • [39] Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
    Yuan, Yilin
    Gu, Yifan
    Zhang, Zhenzhen
    [J]. International Journal of Network Security, 2023, 25 (04) : 609 - 619
  • [40] Heterogeneous Cross-Domain Identity Authentication Scheme Based on Proxy Resignature in Cloud Environment
    Lv, Yongyang
    Liu, Wenju
    Wang, Ze
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020