Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage

被引:5
|
作者
Zhao, Chenbin [1 ,2 ]
Xu, Li [1 ,2 ]
Li, Jiguo [1 ,2 ]
Wang, Feng [1 ,2 ]
Fang, He [3 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350007, Fujian, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
[3] Western Univ, Dept Elect & Comp Engn, London, ON N6A 3K7, Canada
基金
中国国家自然科学基金;
关键词
Cloud computing; Servers; Cryptography; Big Data; Data integrity; Authentication; Big data; cloud storage; data integrity; dynamic operation; fuzzy identity-based; DATA POSSESSION;
D O I
10.1109/ACCESS.2019.2950938
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To ensure the reliability and integrity of data in the cloud storage server, some scholars provided various data integrity auditing schemes. However, the most existing data integrity auditing schemes only support the static data and may be unsuitable for the dynamic operations of data. To overcome this difficulty, we propose a fuzzy identity-based dynamic auditing of big data, which combines the structure of the Merkle hash tree (MHT) with the Index logic table (ILT). Our scheme not only performs the dynamic operations of data block in the ILT, namely modification, insertion and deletion, but also efficiently executes dynamic operations of the ILT on the structure of the MHT. We also elaborate the security, characteristics and performance analysis of the proposed scheme separately. The analysis results show that the proposed scheme costs less time than the structure of the original MHT to generate the root node hash value during the metadata generation phase and update the root node hash value during the dynamic operations. Furthermore, when users store the new ILT in local storage, they require lower communication cost to update root node hash value than users without storing the ILT, and fewer interactions between the cloud storage server and users in the dynamic operations process.
引用
收藏
页码:160459 / 160471
页数:13
相关论文
共 50 条
  • [11] Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10434 - 10445
  • [12] Identity-based remote data integrity auditing from lattices for secure cloud storage
    Yang, Songrun
    Chang, Jinyong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5833 - 5844
  • [13] An identity-based online/offline secure cloud storage auditing scheme
    Rabaninejad, Reyhaneh
    Asaar, Maryam Rajabzadeh
    Attari, Mahmoud Ahmadian
    Aref, Mohammad Reza
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1455 - 1468
  • [14] Identity-based data storage in cloud computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 673 - 681
  • [15] An identity-based online/offline secure cloud storage auditing scheme
    Reyhaneh Rabaninejad
    Maryam Rajabzadeh Asaar
    Mahmoud Ahmadian Attari
    Mohammad Reza Aref
    [J]. Cluster Computing, 2020, 23 : 1455 - 1468
  • [16] Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage
    Deng, Lunzhi
    Feng, Shuai
    Wang, Tao
    Hu, Zhenyu
    Li, Siwei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3644 - 3655
  • [17] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [18] Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
    Yuan, Yilin
    Gu, Yifan
    Zhang, Zhenzhen
    [J]. International Journal of Network Security, 2023, 25 (04) : 609 - 619
  • [19] Enabling identity-based cloud storage public auditing with quantum computers resistance
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (01) : 82 - 98
  • [20] Secure fuzzy identity-based public verification for cloud storage
    Xu, Yongliang
    Jin, Chunhua
    Qin, Wenyu
    Shan, Jinsong
    Jin, Ying
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 128