Efficient Identity-based Public Auditing Scheme for Cloud Storage from Lattice Assumption

被引:2
|
作者
Zhang, Xiaojun [1 ]
Xu, Chunxiang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
关键词
cloud storage; public auditing; lattice-based cryptography; post-quantum cryptography;
D O I
10.1109/CSE.2014.334
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a post-quantum secure cloud storage system supporting privacy-preserving public auditing scheme from lattice assumption. In our public auditing scheme, we introduce a third party auditor (TPA), which can efficiently audit the cloud storage data, bringing no additional on-line burden to the users. We utilize preimage sampleable functions to realize our lattice-based signature, thus can be considered as random masking to make sure the TPA can not recover the primitive data blocks of the users. Based on the inhomogeneous small integer solution assumption (ISIS), our public auditing scheme is proved secure against the data lost attacks and tamper attacks from the cloud service providers. To the best of our knowledge, we construct the first identity-based public auditing for secure cloud storage from lattice assumption, which is an interesting stepping stone in the post-quantum cryptographic communication.
引用
收藏
页码:1819 / 1826
页数:8
相关论文
共 50 条
  • [1] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Wu, Li-bing
    Wang, Jing
    He, De-biao
    Khan, Muhammad-Khurram
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (12) : 1972 - 1977
  • [2] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Li-bing Wu
    Jing Wang
    De-biao He
    Muhammad-Khurram Khan
    [J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1972 - 1977
  • [3] Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
    Zhang, Xiaojun
    Wang, Huaxiong
    Xu, Chunxiang
    [J]. INFORMATION SCIENCES, 2019, 472 : 223 - 234
  • [4] An identity-based online/offline secure cloud storage auditing scheme
    Rabaninejad, Reyhaneh
    Asaar, Maryam Rajabzadeh
    Attari, Mahmoud Ahmadian
    Aref, Mohammad Reza
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1455 - 1468
  • [5] An identity-based online/offline secure cloud storage auditing scheme
    Reyhaneh Rabaninejad
    Maryam Rajabzadeh Asaar
    Mahmoud Ahmadian Attari
    Mohammad Reza Aref
    [J]. Cluster Computing, 2020, 23 : 1455 - 1468
  • [6] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    [J]. IEEE ACCESS, 2020, 8 : 206396 - 206405
  • [7] Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience
    Nithya, S. Mary Virgil
    Uthariaraj, V. Rhymend
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [8] Incentive Public Auditing Scheme with Identity-Based Designated Verifier in Cloud
    Shao, Bilin
    Zhang, Li
    Bian, Genqing
    [J]. ELECTRONICS, 2023, 12 (06)
  • [9] Identity-Based Integrity Verification and Public Auditing Scheme in Cloud Storage System Against Malicious Auditors
    Zhang, Haojue
    Yuan, Yilin
    Xin, Xianwei
    Qu, Yanbo
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2023, 30 (02): : 408 - 415
  • [10] Enabling identity-based cloud storage public auditing with quantum computers resistance
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (01) : 82 - 98