Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage

被引:19
|
作者
Shen, Wenting [1 ,2 ]
Yu, Jia [1 ,3 ]
Yang, Ming [4 ,5 ]
Hu, Jiankun [6 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Shandong Key Lab Comp Networks, Jinan 250014, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Qilu Univ Technol, Shandong Acad Sci, Jinan 250041, Peoples R China
[5] Shandong Comp Sci Ctr, Shandong Key Lab Comp Networks, Jinan 250041, Peoples R China
[6] Univ New South Wales UNSW, Sch Engn & IT, Cyber Secur Lab, Australian Def Force Acad ADFA, Canberra, ACT 2612, Australia
基金
中国国家自然科学基金;
关键词
Cloud storage; data integrity auditing; identity-based cryptography; key-exposure resistance; key update; PROVABLE DATA POSSESSION; SCHEME; ENCRYPTION; SIGNATURES;
D O I
10.1109/TDSC.2022.3228699
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity auditing schemes would inevitably become unable to work. To deal with this problem, we construct a novel and efficient identity-based data integrity auditing scheme with key-exposure resilience for cloud storage. This is achieved by designing a novel key update technique, which is fully compatible with BLS signature used in identity-based data integrity auditing. In our design, the Third Party Auditor (TPA) is responsible for generating update information. The user can update his private key based on the private key in one previous time period and the update information from the TPA. Furthermore, the proposed scheme supports real lazy update, which greatly improves the efficiency and the feasibility of key update. Meanwhile, the proposed scheme relies on identity-based cryptography, which makes certificate management easy. The security proof and the performance analysis demonstrate that the proposed scheme achieves desirable security and efficiency.
引用
收藏
页码:4593 / 4606
页数:14
相关论文
共 50 条
  • [1] Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience
    Nithya, S. Mary Virgil
    Uthariaraj, V. Rhymend
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [2] Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
    Zhang, Xiaojun
    Wang, Huaxiong
    Xu, Chunxiang
    [J]. INFORMATION SCIENCES, 2019, 472 : 223 - 234
  • [3] Enabling Cloud Storage Auditing With Key-Exposure Resistance
    Yu, Jia
    Ren, Kui
    Wang, Cong
    Varadharajan, Vijay
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1167 - 1179
  • [4] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [5] Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving
    Yan, Hao
    Gui, Wenming
    [J]. IEEE ACCESS, 2021, 9 (09): : 45822 - 45831
  • [6] Identity-based remote data integrity auditing from lattices for secure cloud storage
    Yang, Songrun
    Chang, Jinyong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5833 - 5844
  • [7] Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
    Yu, Jia
    Wang, Huaqun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1931 - 1940
  • [8] Online/offline remote data auditing with strong key-exposure resilience for cloud storage
    Gan, Qingqing
    Wang, Xiaoming
    Huang, Daxin
    Li, Jianwei
    Wang, Changji
    Liu, Zhen
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [9] Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage
    Guo, Hua
    Ma, Fangchao
    Li, Zhoujun
    Xia, Chunhe
    [J]. TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 127 - 136
  • [10] Key-exposure resilient integrity auditing scheme with encrypted data deduplication
    Zhang X.
    Li C.
    Liu Z.
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (04): : 95 - 106