An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage

被引:2
|
作者
Kumar, Mahender [1 ]
Maple, Carsten [1 ]
Chand, Satish [2 ]
机构
[1] Univ Warwick, Cyber Syst Engn Grp, WMG, Coventry, England
[2] Jawaharlal Nehru Univ, Delhi, India
关键词
Multi-cloud; Replacement attacks; Integrity auditing; Sensitive information; ID-Based cryptosystem; PROTOCOL; REPLICA;
D O I
10.1016/j.jksuci.2023.101745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of cloud storage brings forth significant difficulties in ensuring the integrity of data owners' sensitive data. Multi-cloud storage systems, which motive to enhance trustworthiness, are vulnerable to rigorous replacement attacks. These insidious attacks involve malicious actors substituting legitimate data with counterfeit versions, leading to compromised integrity and fraudulent audit outcomes. We propose a novel identity-based data integrity auditing protocol tailored for multi-cloud storage environments to tackle this challenge. Our protocol leverages a Third-Party Auditor (TPA) to delegate data authenticity and auditing responsibilities, employing identity-based blind signatures with a robust data recovery scheme. By eliminating the need for cumbersome public key certificate management, our solution effectively protects data owners' sensitive data while ensuring confidentiality across multiple cloud providers, thereby mitigating the risk of replacement attacks. A thorough security examination shows the proposed system resists forging, replacement attacks, and data confidentiality violations. A rigorous performance experiment also reveals outstanding computational and communication efficiency that outperforms current methods in tag production, proof generation, and verification. Our protocol offers an extraordinary balance of security and efficiency, making it particularly useful for auditing patent-sensitive data in multi-cloud storage. Our proposal provides a timely and effective way to protect sensitive data and prevent attackers in multi-cloud storage settings at a time when replacement attacks pose a serious concern. (c) 2023 The Authors. Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:12
相关论文
共 50 条
  • [11] Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 356 - 365
  • [12] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [13] A Blockchain-Based Efficient Data Integrity Verification Scheme in Multi-Cloud Storage
    Zhang, Yiran
    Geng, Huizheng
    Su, Li
    Lu, Li
    IEEE ACCESS, 2022, 10 : 105920 - 105929
  • [14] Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving
    Yan, Hao
    Gui, Wenming
    IEEE ACCESS, 2021, 9 (09): : 45822 - 45831
  • [15] CIA: A Collaborative Integrity Auditing Scheme for Cloud Data With Multi-Replica on Multi-Cloud Storage Providers
    Li, Tengfei
    Chu, Jianfeng
    Hu, Liang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (01) : 154 - 162
  • [16] Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited
    Chang, Jinyong
    Shao, Bilin
    Ji, Yanyan
    Bian, Genqing
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (12) : 2723 - 2727
  • [17] On the Security of a Data Integrity Auditing Scheme in Mobile Multi-cloud Environment
    Zhang, Jianhong
    Ou, Peirong
    Bai, Wenle
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 40 - 44
  • [18] An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems
    Li, Xiong
    Shang, Shuai
    Liu, Shanpeng
    Gu, Ke
    Jan, Mian Ahmad
    Zhang, Xiaosong
    Khan, Fazlullah
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) : 2556 - 2567
  • [19] Efficient Identity-based Public Auditing Scheme for Cloud Storage from Lattice Assumption
    Zhang, Xiaojun
    Xu, Chunxiang
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1819 - 1826
  • [20] A secure and efficient remote data auditing scheme for cloud storage
    El Ghoubach, Imad
    Ben Abbou, Rachid
    Mrabti, Fatiha
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (05) : 593 - 599