An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage

被引:2
|
作者
Kumar, Mahender [1 ]
Maple, Carsten [1 ]
Chand, Satish [2 ]
机构
[1] Univ Warwick, Cyber Syst Engn Grp, WMG, Coventry, England
[2] Jawaharlal Nehru Univ, Delhi, India
关键词
Multi-cloud; Replacement attacks; Integrity auditing; Sensitive information; ID-Based cryptosystem; PROTOCOL; REPLICA;
D O I
10.1016/j.jksuci.2023.101745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of cloud storage brings forth significant difficulties in ensuring the integrity of data owners' sensitive data. Multi-cloud storage systems, which motive to enhance trustworthiness, are vulnerable to rigorous replacement attacks. These insidious attacks involve malicious actors substituting legitimate data with counterfeit versions, leading to compromised integrity and fraudulent audit outcomes. We propose a novel identity-based data integrity auditing protocol tailored for multi-cloud storage environments to tackle this challenge. Our protocol leverages a Third-Party Auditor (TPA) to delegate data authenticity and auditing responsibilities, employing identity-based blind signatures with a robust data recovery scheme. By eliminating the need for cumbersome public key certificate management, our solution effectively protects data owners' sensitive data while ensuring confidentiality across multiple cloud providers, thereby mitigating the risk of replacement attacks. A thorough security examination shows the proposed system resists forging, replacement attacks, and data confidentiality violations. A rigorous performance experiment also reveals outstanding computational and communication efficiency that outperforms current methods in tag production, proof generation, and verification. Our protocol offers an extraordinary balance of security and efficiency, making it particularly useful for auditing patent-sensitive data in multi-cloud storage. Our proposal provides a timely and effective way to protect sensitive data and prevent attackers in multi-cloud storage settings at a time when replacement attacks pose a serious concern. (c) 2023 The Authors. Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10434 - 10445
  • [22] A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults
    Zhang, Cheng
    Xu, Yang
    Hu, Yupeng
    Wu, Jiajing
    Ren, Ju
    Zhang, Yaoxue
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2252 - 2263
  • [23] An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR
    Zhou, Lei
    Fu, Anmin
    Feng, Jingyu
    Zhou, Chunyi
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [24] Identity-Based Integrity Verification and Public Auditing Scheme in Cloud Storage System Against Malicious Auditors
    Zhang, Haojue
    Yuan, Yilin
    Xin, Xianwei
    Qu, Yanbo
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2023, 30 (02): : 408 - 415
  • [25] Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
    Yuan, Yilin
    Gu, Yifan
    Zhang, Zhenzhen
    International Journal of Network Security, 2023, 25 (04) : 609 - 619
  • [26] Identity-based controlled delegated outsourcing data integrity auditing scheme
    Du, Jianming
    Dong, Guofang
    Ning, Juangui
    Xu, Zhengnan
    Yang, Ruicheng
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [27] Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage
    Deng, Lunzhi
    Feng, Shuai
    Wang, Tao
    Hu, Zhenyu
    Li, Siwei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3644 - 3655
  • [28] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    S. Anbuchelian
    C. M. Sowmya
    C. Ramesh
    Cluster Computing, 2019, 22 : 9767 - 9775
  • [29] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [30] Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage
    Garg, Neenu
    Nehra, Anushka
    Baza, Mohamed
    Kumar, Neeraj
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,