Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property

被引:0
|
作者
Ji, Yanyan [1 ]
Shao, Bilin [1 ]
Chang, Jinyong [2 ,3 ]
Bian, Genqing [2 ,3 ]
机构
[1] Xian Univ Architecture & Technol, Sch Management, Xian 710055, Shaanxi, Peoples R China
[2] Xian Univ Architecture & Technol, Sch Informat & Control Engn, Xian 710055, Shaanxi, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; Identity-based cryptography; Integrity checking; Privacy preserving; DATA POSSESSION CHECKING; BIG DATA; SCHEME;
D O I
10.1007/s10586-021-03408-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Provable data possession (PDP) protocol is a mechanism that guarantees the integrity of user's cloud data, and many efficient protocols have been proposed. Many of them ignore data's privacy against the third-party auditor (TPA) and also suffer from intricate management of certificates, which heavily relies on the public key infrastructure (PKI). In order to overcome the two shortcomings, Li et al. recently proposed an "identity-based" (IB) PDP protocol with the privacy-preserving property (IEEE Syst J, ). However, we find out that (1) their protocol has great communication overhead, (2) a PKI-based signature scheme is used as a building block, which results in their protocol is not completely identity-based. Hence, in this paper, we try to improve the performance of this protocol. Concretely, by adopting flexible data-splitting and tag-aggregating techniques, we can greatly reduce its communication overhead. A concrete example shows that the total communication overhead can be reduced over 99%. Moreover, by replacing with an identity-based signature, we can twist this protocol into a complete IB-PDP protocol.
引用
收藏
页码:337 / 349
页数:13
相关论文
共 50 条
  • [1] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    [J]. Cluster Computing, 2022, 25 (01) : 337 - 349
  • [2] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Yanyan Ji
    Bilin Shao
    Jinyong Chang
    Genqing Bian
    [J]. Cluster Computing, 2022, 25 : 337 - 349
  • [3] Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 577 - 585
  • [4] Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
    Yu, Yong
    Au, Man Ho
    Ateniese, Giuseppe
    Huang, Xinyi
    Susilo, Willy
    Dai, Yuanshun
    Min, Geyong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 767 - 778
  • [5] Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier
    Bian, Genqing
    Zhang, Rui
    Shao, Bilin
    [J]. IEEE ACCESS, 2022, 10 : 40556 - 40570
  • [6] Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
    Liu, Zhangyun
    Liao, Yongjian
    Yang, Xiaowei
    He, Yichuan
    Zhao, Kun
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 128 - 135
  • [7] A Wew Remote Data Integrity Checking Scheme for Cloud storage With Privacy Preserving
    Yan, Xiangtao
    Li, Yifa
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 704 - 708
  • [8] Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving
    Yan, Hao
    Gui, Wenming
    [J]. IEEE ACCESS, 2021, 9 : 45822 - 45831
  • [9] Identity-based cloud storage integrity checking from lattices
    Tian, Miaomiao
    Gao, Chuang
    Chen, Jie
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (04): : 128 - 139
  • [10] Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
    Wang, Huaqun
    He, Debiao
    Tang, Shaohua
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1165 - 1176