A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage

被引:4
|
作者
Deng, Lunzhi [1 ,2 ,3 ]
Yang, Benjuan [1 ]
Wang, Xiangbin [3 ]
机构
[1] Guizhou Normal Univ, Sch Math Sci, Guiyang 550001, Peoples R China
[2] Guizhou Univ, Coll Comp Sci & Technol, Guiyang 550025, Peoples R China
[3] Guizhou Normal Univ, Sch Big Data & Comp Sci, Guiyang 550001, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Cloud computing; Security; Computational modeling; Servers; Distributed databases; Data integrity; Additives; Cloud storage; data auditing; identity-based; pairing; third-party auditor; PROVABLE DATA POSSESSION; OUTSOURCED DATA; EFFICIENT; SECURE; INSECURITY; CHECKING;
D O I
10.1109/ACCESS.2020.3037696
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage enables data owners to use any device to store and access data anytime, anywhere. In a data auditing scheme, the data owner can entrust a third party auditor (TPA) to verify that the outsourced data remains unchanged. A secure data auditing scheme not only detects whether cloud service providers (CSP) maintain data integrity, but also prevents TPA from stealing data. In this paper, a new identity-based data auditing (IBDA) scheme for cloud storage systems is proposed. In the scheme, the data owner generates the tags using its private key and data blocks, and then uploads the data blocks along with the tags to CSP. In the challenge-proof phase, before returning the proof information, CSP performs the addition operation between the hash function value and the data block to hide the data, thereby preventing TPA from stealing the data. This scheme is proved to be secure in the random oracle model. Analysis of efficiency shows that it is more efficient than other schemes.
引用
收藏
页码:206396 / 206405
页数:10
相关论文
共 50 条
  • [1] Identity-based remote data integrity auditing from lattices for secure cloud storage
    Yang, Songrun
    Chang, Jinyong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5833 - 5844
  • [2] An identity-based online/offline secure cloud storage auditing scheme
    Rabaninejad, Reyhaneh
    Asaar, Maryam Rajabzadeh
    Attari, Mahmoud Ahmadian
    Aref, Mohammad Reza
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1455 - 1468
  • [3] An identity-based online/offline secure cloud storage auditing scheme
    Reyhaneh Rabaninejad
    Maryam Rajabzadeh Asaar
    Mahmoud Ahmadian Attari
    Mohammad Reza Aref
    [J]. Cluster Computing, 2020, 23 : 1455 - 1468
  • [4] Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage
    Deng, Lunzhi
    Feng, Shuai
    Wang, Tao
    Hu, Zhenyu
    Li, Siwei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3644 - 3655
  • [5] Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
    Zhao, Chenbin
    Xu, Li
    Li, Jiguo
    Wang, Feng
    Fang, He
    [J]. IEEE ACCESS, 2019, 7 : 160459 - 160471
  • [6] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [7] Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
    He, Debiao
    Wang, Huaqun
    Zhang, Jianhong
    Wang, Lina
    [J]. INFORMATION SCIENCES, 2017, 375 : 48 - 53
  • [8] Efficient Identity-based Public Auditing Scheme for Cloud Storage from Lattice Assumption
    Zhang, Xiaojun
    Xu, Chunxiang
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1819 - 1826
  • [9] Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data
    Tian, Hui
    Peng, Fang
    Quan, Hanyu
    Chang, Chin-Chen
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [10] A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment
    Shen, Wenting
    Qin, Jing
    Ma, Jixin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019,