Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage

被引:92
|
作者
Li, Jiguo [1 ,2 ]
Yan, Hao [3 ]
Zhang, Yichen [4 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Jinling Inst Technol, Coll Cyber Secur, Nanjing 211169, Peoples R China
[4] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 01期
基金
中国国家自然科学基金;
关键词
Cloud computing; Servers; Data integrity; Data privacy; Protocols; Data models; Cloud storage; identity-based cryptography; remote data checking; privacy preserving; ATTRIBUTE-BASED ENCRYPTION; DATA POSSESSION CHECKING; REVOCATION;
D O I
10.1109/JSYST.2020.2978146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although cloud storage service enables people easily maintain and manage amounts of data with lower cost, it cannot ensure the integrity of people's data. In order to audit the correctness of the data without downloading them, many remote data integrity checking (RDIC) schemes have been presented. Most existing schemes ignore the important issue of data privacy preserving and suffer from complicated certificate management derived from public key infrastructure. To overcome these shortcomings, this article proposes a new Identity-based RDIC scheme that makes use of homomorphic verifiable tag to decrease the system complexity. The original data in proof are masked by random integer addition, which protects the verifier from obtaining any knowledge about the data during the integrity checking process. Our scheme is proved secure under the assumption of computational Diffie-Hellman problem. Experiment result exhibits that our scheme is very efficient and feasible for real-life applications.
引用
收藏
页码:577 / 585
页数:9
相关论文
共 50 条
  • [11] Efficient Privacy Preserving Integrity Checking Model for Cloud Data Storage Security
    Subha, T.
    Jayashri, S.
    2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 55 - 60
  • [12] Identity-based remote data integrity auditing from lattices for secure cloud storage
    Yang, Songrun
    Chang, Jinyong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5833 - 5844
  • [13] Remote data possession checking with privacy-preserving authenticators for cloud storage
    Shen, Wenting
    Yang, Guangyang
    Yu, Jia
    Zhang, Hanlin
    Kong, Fanyu
    Hao, Rong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 76 : 136 - 145
  • [14] Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing
    Zhao, Jining
    Xu, Chunxiang
    Li, Fagen
    Zhang, Wenzheng
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (12) : 2709 - 2716
  • [15] Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas
    Peng, Su
    Zhou, Fucai
    Li, Jin
    Wang, Qiang
    Xu, Zifeng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 134 : 72 - 88
  • [16] Cloud data integrity checking with an identity-based auditing mechanism from RSA
    Yu, Yong
    Xue, Liang
    Au, Man Ho
    Susilo, Willy
    Ni, Jianbing
    Zhang, Yafang
    Vasilakos, Athanasios V.
    Shen, Jian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 85 - 91
  • [17] Comment on id-based remote data integrity checking with data privacy preserving
    Zhang, Jianhong
    Meng, Hongxin
    2017 2ND INTERNATIONAL SEMINAR ON ADVANCES IN MATERIALS SCIENCE AND ENGINEERING, 2017, 231
  • [18] Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
    Yong Yu
    Man Ho Au
    Yi Mu
    Shaohua Tang
    Jian Ren
    Willy Susilo
    Liju Dong
    International Journal of Information Security, 2015, 14 : 307 - 318
  • [19] Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
    Yu, Yong
    Au, Man Ho
    Mu, Yi
    Tang, Shaohua
    Ren, Jian
    Susilo, Willy
    Dong, Liju
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (04) : 307 - 318
  • [20] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    IEEE ACCESS, 2020, 8 : 206396 - 206405