A Compressive Integrity Auditing Protocol for Secure Cloud Storage

被引:18
|
作者
Yang, Yang [1 ]
Chen, Yanjiao [2 ]
Chen, Fei [3 ]
机构
[1] Zhongnan Univ Econ & Law, Sch Informat & Secur Engn, Wuhan 430073, Peoples R China
[2] Zhejiang Univ, Coll Elect Engn, Hangzhou 310007, Peoples R China
[3] Shenzhen Univ, Coll Comp Sci & Engn, Shenzhen 518061, Peoples R China
关键词
Cloud computing; Protocols; Indexes; Secure storage; Cryptography; Arrays; Lattices; Data integrity auditing; compressive cloud storage; GGH cryptography; data dynamics; SHARED DATA;
D O I
10.1109/TNET.2021.3058130
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread application of cloud storage, ensuring the integrity of user outsourced data catches more and more attention. To remotely check the integrity of cloud storage, plenty of protocols have been proposed, implemented by checking the equation constructed by the aggregated blocks, tags, and indices. However, the verifier only has the knowledge of the indices of the audited blocks and tags, which thus requires the cloud to store both data blocks and tags for integrity verification. In this article, we present a compressive secure cloud storage protocol inspired by Goldreich-Goldwasser-Halevi (GGH) cryptosystem. Since the aggregated blocks can be reconstructed from the aggregated tags without the help of data indices, the cloud can only store data tags for providing the verifiable integrity proof. In this way, communication and storage costs can be hugely reduced and user private information can be hidden from the cloud. Furthermore, the proposed protocol only contains a few basic algebraic operations, making it highly efficient. We also provide formal security proof of the proposed protocol regarding forge, replay and replace attacks. In addition, we explore a new technique to support data dynamics. Furthermore, we establish a generic framework of compressive secure cloud storage protocols. Finally, we provide the theoretical analysis and experimental results, which further validate the effectiveness of the proposed protocol.
引用
收藏
页码:1197 / 1209
页数:13
相关论文
共 50 条
  • [1] Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    Ma, Jixin
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1408 - 1421
  • [2] An improved public auditing protocol for cloud storage integrity checking
    Zhang, Jindan
    Wang, Baocang
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2019, 15 (03) : 282 - 303
  • [3] Improved secure fuzzy auditing protocol for cloud data storage
    Zhang, Jindan
    Wang, Baocang
    He, Debiao
    Wang, Xu An
    [J]. SOFT COMPUTING, 2019, 23 (10) : 3411 - 3422
  • [4] Improved secure fuzzy auditing protocol for cloud data storage
    Jindan Zhang
    Baocang Wang
    Debiao He
    Xu An Wang
    [J]. Soft Computing, 2019, 23 : 3411 - 3422
  • [5] An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
    Yang, Kan
    Jia, Xiaohua
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (09) : 1717 - 1726
  • [6] Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage
    Yu, Yong
    Li, Yannan
    Yang, Bo
    Susilo, Willy
    Yang, Guomin
    Bai, Jian
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 377 - 390
  • [7] Data integrity auditing for secure cloud storage using user behavior prediction
    Tian, Junfeng
    Wang, Haoning
    Wang, Meng
    [J]. COMPUTERS & SECURITY, 2021, 105
  • [8] Secure Storage of Electronic Health Records on Cloud Using Integrity Verification Auditing
    Srinivasan, S.
    Keerthi, Kethineni
    Tejaswi, Gummadi
    Shobana, Kodali Divya
    [J]. REVISTA GEINTEC-GESTAO INOVACAO E TECNOLOGIAS, 2021, 11 (02): : 2132 - 2141
  • [9] A Secure Certificate-Based Data Integrity Auditing Protocol with Cloud Service Providers
    Tian, Yuan
    Zhou, Xuan
    Zhou, Tanping
    Zhong, Weidong
    Li, Ruifeng
    Yang, Xiaoyuan
    [J]. MATHEMATICS, 2024, 12 (13)
  • [10] Privacy Preserving Data Auditing Protocol for Secure Storage in Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2725 - 2729