ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification

被引:4
|
作者
Kang, Baoyuan [1 ]
Si, Lin [1 ]
Jiang, Hong [2 ]
Li, Chunqing [1 ]
Xie, Mingming [1 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Sci & Software, Tianjin 300387, Peoples R China
[2] Tianjin Polytech Univ, Sch Management, Tianjin 300387, Peoples R China
基金
中国国家自然科学基金;
关键词
OUTSOURCED DATA; DATA POSSESSION; STORAGE; SCHEME; EFFICIENT; SECURITY;
D O I
10.1155/2018/3205898
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud service, people with limited storage space can store their data files to the cloud and delete the file in their memory. However, the cloud service provider may change or partly delete user's file for his benefit. Therefore, it is necessary for the user to periodically check the data file integrity. Public auditing protocols are just designated for checking the data file integrity by an auditor on behalf of the user. Recently, based on ID-based cryptography many ID-based public auditing protocols for cloud data integrity checking are proposed. However, some existing protocols are subjected to forgery attack. Other existing protocols cannot preserve the privacy of the user, as the auditor can obtain user's file content through times of auditing the same file blocks. In this paper, we propose a new ID-based public auditing protocol for cloud data integrity checking with optimized structure, privacy-preserving, and effective aggregation verification. We also prove that the proposed protocol can resist forgery attack under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare our protocol with other ID-based auditing protocols.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] ID-based sanitizable signature data integrity auditing scheme with privacy-preserving
    Liu, Zhenpeng
    Ren, Lele
    Li, Ruilin
    Liu, Qiannan
    Zhao, Yonggang
    [J]. COMPUTERS & SECURITY, 2022, 121
  • [2] Privacy-preserving public auditing for data integrity in cloud
    Saleem, M. Shaik
    Murali, M.
    [J]. PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18), 2018, 1000
  • [3] ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security
    JIANG Hong
    XIE Mingming
    KANG Baoyuan
    LI Chunqing
    SI Lin
    [J]. Wuhan University Journal of Natural Sciences, 2018, 23 (04) : 362 - 368
  • [4] Comment on id-based remote data integrity checking with data privacy preserving
    Zhang, Jianhong
    Meng, Hongxin
    [J]. 2017 2ND INTERNATIONAL SEMINAR ON ADVANCES IN MATERIALS SCIENCE AND ENGINEERING, 2017, 231
  • [5] Pseudo-ID-based public auditing with privacy-preserving for cloud storage
    Liu, Xue-Yan
    He, Xiao-Mei
    Lu, Ting-Ting
    [J]. Journal of Computers (Taiwan), 2020, 31 (03) : 154 - 167
  • [6] An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme
    Kiraz, Mehmet Sabir
    Sertkaya, Isa
    Uzunkol, Osmanbey
    [J]. 2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2015, : 117 - 124
  • [7] A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
    Hao, Zhuo
    Zhong, Sheng
    Yu, Nenghai
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (09) : 1432 - 1437
  • [8] Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (01) : 43 - 56
  • [9] Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
    Alkhojandi, Naelah
    Miri, Ali
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 35 - 48
  • [10] Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage
    Zhao, Xia'nan
    Wang, Dongsheng
    [J]. 2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 486 - 491