Public integrity auditing for shared dynamic cloud data

被引:4
|
作者
Singh, Shubham [1 ]
Thokchom, Surmila [1 ]
机构
[1] NIT Meghalaya, Dept Comp Sci & Engn, Shillong 793003, Meghalaya, India
关键词
Cloud computing; public integrity auditing; vector commitment; ring signature; group key agreement protocol; EFFICIENT; SIGNATURES; REVOCATION; SECURE;
D O I
10.1016/j.procs.2017.12.090
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is an important storage platform being researched nowadays. It provides various services to its users. Among them, one of the salient service offered is cloud storage which makes data outsourcing a rising trend. But the major concern associated is the integrity and seclusion of outsourced data. Users require their data to be secure from any modification or unauthorized access. Therefore someway to verify whether the data is intact or not, without retrieving, should exist. This boosts the need of secure remote data auditing. This paper proposes an auditing scheme based on vector commitment, identity based ring signature and group key agreement protocol, emanated on bilinear pairing. An experimental analysis of the proposed scheme, later in the end, shows that when compared with its pertinent schemes, the proposed scheme is also efficient. (C) 2018 The Authors. Published by Elsevier B.V.
引用
收藏
页码:698 / 708
页数:11
相关论文
共 50 条
  • [1] Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
    Jiang, Tao
    Chen, Xiaofeng
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2363 - 2373
  • [2] Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage
    Gudeme, Jaya Rao
    Pasupuleti, Syam Kumar
    Kandukuri, Ramesh
    [J]. COMPUTERS & SECURITY, 2021, 103
  • [3] Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group
    Han, Chunxia
    Wang, Linjie
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [4] Certificateless Public Auditing for Data Integrity in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    Li, Fenghua
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 136 - 144
  • [5] Public Integrity Auditing for Shared Data with Efficient and Secure User Revocation in Cloud Computing
    Gudeme, Jaya Rao
    Pasupuleti, Syam Kumar
    Kandukuri, Ramesh
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 588 - 593
  • [6] AUDITING OF DATA INTEGRITY OVER DYNAMIC DATA IN CLOUD
    Kumar, P. Santhosh
    Parthiban, Latha
    Jegatheeswari, V.
    [J]. 2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 43 - 48
  • [7] Public Auditing Scheme for Cloud Data Integrity Verification
    Hiremath, Shivarajkumar
    Kunte, R. Sanjeev
    [J]. INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 237 - 246
  • [8] Preserving Privacy in Public Auditing for Shared Cloud Data
    Anjali, R. S.
    Ravikumar, Aswathy
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 11 - 16
  • [9] Dynamic data integrity auditing for secure outsourcing in the cloud
    Wei, Jinxia
    Zhang, Ru
    Liu, Jianyi
    Li, Jing
    Niu, Xinxin
    Yao, Yuangang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12):
  • [10] Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation
    Luo, Yuchuan
    Xu, Ming
    Fu, Shaojing
    Wang, Dongsheng
    Deng, Junquan
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 434 - 442