Efficient Identity-based Public Auditing Scheme for Cloud Storage from Lattice Assumption

被引:2
|
作者
Zhang, Xiaojun [1 ]
Xu, Chunxiang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
关键词
cloud storage; public auditing; lattice-based cryptography; post-quantum cryptography;
D O I
10.1109/CSE.2014.334
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a post-quantum secure cloud storage system supporting privacy-preserving public auditing scheme from lattice assumption. In our public auditing scheme, we introduce a third party auditor (TPA), which can efficiently audit the cloud storage data, bringing no additional on-line burden to the users. We utilize preimage sampleable functions to realize our lattice-based signature, thus can be considered as random masking to make sure the TPA can not recover the primitive data blocks of the users. Based on the inhomogeneous small integer solution assumption (ISIS), our public auditing scheme is proved secure against the data lost attacks and tamper attacks from the cloud service providers. To the best of our knowledge, we construct the first identity-based public auditing for secure cloud storage from lattice assumption, which is an interesting stepping stone in the post-quantum cryptographic communication.
引用
收藏
页码:1819 / 1826
页数:8
相关论文
共 50 条
  • [21] Identity-based public auditing for cloud storage systems against malicious auditors via blockchain
    Jingting XUE
    Chunxiang XU
    Jining ZHAO
    Jianfeng MA
    [J]. Science China(Information Sciences), 2019, 62 (03) : 45 - 60
  • [22] Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage
    Cui, Yuanyou
    Su, Yunxuan
    Tu, Zheng
    Zhang, Jindan
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 469 - 479
  • [23] Identity-based public auditing for cloud storage systems against malicious auditors via blockchain
    Jingting Xue
    Chunxiang Xu
    Jining Zhao
    Jianfeng Ma
    [J]. Science China Information Sciences, 2019, 62
  • [24] An Efficient Provable Secure Public Auditing Scheme for Cloud Storage
    Xu, Chunxiang
    Zhang, Yuan
    Yu, Yong
    Zhang, Xiaojun
    Wen, Junwei
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4226 - 4241
  • [25] An Efficient Public Auditing Scheme for Multi-Cloud Storage
    Yu, Haiyang
    Cai, Yongquan
    Kong, Shanshan
    Xue, Fei
    Allah, Ditta
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 81 - 96
  • [26] Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
    Zhang, Yue
    Yu, Jia
    Hao, Rong
    Wang, Cong
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 608 - 619
  • [27] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [28] An identity-based cryptographic scheme for cloud storage applications
    Medhioub, Manel
    Hamdi, Mohamed
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (02) : 93 - 104
  • [29] Public Proof of Cloud Storage from Lattice Assumption
    LIU Hongwei
    CAO Wenming
    [J]. Chinese Journal of Electronics, 2014, 23 (01) : 186 - 190
  • [30] Public Proof of Cloud Storage from Lattice Assumption
    Liu Hongwei
    Cao Wenming
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (01) : 186 - 190