Cloud data integrity checking with an identity-based auditing mechanism from RSA

被引:82
|
作者
Yu, Yong [1 ]
Xue, Liang [1 ]
Au, Man Ho [2 ]
Susilo, Willy [4 ]
Ni, Jianbing [1 ]
Zhang, Yafang [1 ]
Vasilakos, Athanasios V. [3 ]
Shen, Jian [5 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Big Data Res Ctr, Chengdu 611731, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[3] Lulea Univ Technol, S-95187 Lulea, Sweden
[4] Univ Wollongong, Ctr Comp & Informat Secur Res, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[5] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; Data integrity; Identity-based signature; Provable security; DATA POSSESSION; VERIFICATION; SECURITY;
D O I
10.1016/j.future.2016.02.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud data auditing is extremely essential for securing cloud storage since it enables cloud users to verify the integrity of their outsourced data efficiently. The computation overheads on both the cloud server and the verifier can be significantly reduced by making use of data auditing because there is no necessity to retrieve the entire file but rather just use a spot checking technique. A number of cloud data auditing schemes have been proposed recently, but a majority of the proposals are based on Public Key Infrastructure (PKI). There are some drawbacks in these protocols: (1) It is mandatory to verify the validity of public key certificates before using any public key, which makes the verifier incur expensive computation cost. (2) Complex certificate management makes the whole protocol inefficient. To address the key management issues in cloud data auditing, in this paper, we propose ID-CDIC, an identity-based cloud data integrity checking protocol which can eliminate the complex certificate management in traditional cloud data integrity checking protocols. The proposed concrete construction from RSA signature can support variable-sized file blocks and public auditing. In addition, we provide a formal security model for ID-CDIC and prove the security of our construction under the RSA assumption with large public exponents in the random oracle model. We demonstrate the performance of our proposal by developing a prototype of the protocol. Implementation results show that the proposed ID-CDIC protocol is very practical and adoptable in real life. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:85 / 91
页数:7
相关论文
共 50 条
  • [1] Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
    Liu, Zhangyun
    Liao, Yongjian
    Yang, Xiaowei
    He, Yichuan
    Zhao, Kun
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 128 - 135
  • [2] Identity-based cloud storage integrity checking from lattices
    Tian, Miaomiao
    Gao, Chuang
    Chen, Jie
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (04): : 128 - 139
  • [3] Identity-based remote data integrity auditing from lattices for secure cloud storage
    Yang, Songrun
    Chang, Jinyong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5833 - 5844
  • [4] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [5] Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 577 - 585
  • [6] An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems
    Li, Xiong
    Shang, Shuai
    Liu, Shanpeng
    Gu, Ke
    Jan, Mian Ahmad
    Zhang, Xiaosong
    Khan, Fazlullah
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) : 2556 - 2567
  • [7] Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
    Yu, Yong
    Au, Man Ho
    Ateniese, Giuseppe
    Huang, Xinyi
    Susilo, Willy
    Dai, Yuanshun
    Min, Geyong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 767 - 778
  • [8] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [9] Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
    Wang, Huaqun
    He, Debiao
    Tang, Shaohua
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1165 - 1176
  • [10] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    [J]. Cluster Computing, 2022, 25 (01) : 337 - 349