Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage

被引:92
|
作者
Li, Jiguo [1 ,2 ]
Yan, Hao [3 ]
Zhang, Yichen [4 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Jinling Inst Technol, Coll Cyber Secur, Nanjing 211169, Peoples R China
[4] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 01期
基金
中国国家自然科学基金;
关键词
Cloud computing; Servers; Data integrity; Data privacy; Protocols; Data models; Cloud storage; identity-based cryptography; remote data checking; privacy preserving; ATTRIBUTE-BASED ENCRYPTION; DATA POSSESSION CHECKING; REVOCATION;
D O I
10.1109/JSYST.2020.2978146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although cloud storage service enables people easily maintain and manage amounts of data with lower cost, it cannot ensure the integrity of people's data. In order to audit the correctness of the data without downloading them, many remote data integrity checking (RDIC) schemes have been presented. Most existing schemes ignore the important issue of data privacy preserving and suffer from complicated certificate management derived from public key infrastructure. To overcome these shortcomings, this article proposes a new Identity-based RDIC scheme that makes use of homomorphic verifiable tag to decrease the system complexity. The original data in proof are masked by random integer addition, which protects the verifier from obtaining any knowledge about the data during the integrity checking process. Our scheme is proved secure under the assumption of computational Diffie-Hellman problem. Experiment result exhibits that our scheme is very efficient and feasible for real-life applications.
引用
收藏
页码:577 / 585
页数:9
相关论文
共 50 条
  • [21] Privacy preserving and public auditable integrity checking on dynamic Cloud data
    Thokchom, Surmila
    Saikia, Dilip Kr.
    International Journal of Network Security, 2019, 21 (02) : 221 - 229
  • [22] Identity-based remote data checking with a designated verifier
    Yanyan Ji
    Bilin Shao
    Jinyong Chang
    Maozhi Xu
    Rui Xue
    Journal of Cloud Computing, 11
  • [23] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [24] Identity-based remote data checking with a designated verifier
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Xu, Maozhi
    Xue, Rui
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [25] Multi-Party Identity-Based Symmetric Privacy-Preserving Matching with Cloud Storage
    QIU Shuo
    LIU Jiqiang
    SHI Yanfeng
    HAN Zhen
    WuhanUniversityJournalofNaturalSciences, 2014, 19 (05) : 426 - 432
  • [26] Identity-Preserving Public Integrity Checking with Dynamic Groups for Cloud Storage
    Hu, Aoting
    Jiang, Rui
    Bhargava, Bharat
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (04) : 1097 - 1110
  • [27] Identity-based data storage in cloud computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 673 - 681
  • [28] Privacy preserving integrity checking of shared dynamic cloud data with user revocation
    Thokchom, Surmila
    Saikia, Dilip Kr
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
  • [29] Identity-based remote data possession checking in public clouds
    Wang, Huaqun
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    IET INFORMATION SECURITY, 2014, 8 (02) : 114 - 121
  • [30] Integrity checking protocol with identity-based proxy signature in mobile cloud computing
    Yan, Li
    Shi, Run-Hua
    Zhong, Hong
    Cui, Jie
    Zhang, Shun
    Xu, Yan
    Tongxin Xuebao/Journal on Communications, 2015, 36 (10): : 278 - 286