A Compressive Integrity Auditing Protocol for Secure Cloud Storage

被引:18
|
作者
Yang, Yang [1 ]
Chen, Yanjiao [2 ]
Chen, Fei [3 ]
机构
[1] Zhongnan Univ Econ & Law, Sch Informat & Secur Engn, Wuhan 430073, Peoples R China
[2] Zhejiang Univ, Coll Elect Engn, Hangzhou 310007, Peoples R China
[3] Shenzhen Univ, Coll Comp Sci & Engn, Shenzhen 518061, Peoples R China
关键词
Cloud computing; Protocols; Indexes; Secure storage; Cryptography; Arrays; Lattices; Data integrity auditing; compressive cloud storage; GGH cryptography; data dynamics; SHARED DATA;
D O I
10.1109/TNET.2021.3058130
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread application of cloud storage, ensuring the integrity of user outsourced data catches more and more attention. To remotely check the integrity of cloud storage, plenty of protocols have been proposed, implemented by checking the equation constructed by the aggregated blocks, tags, and indices. However, the verifier only has the knowledge of the indices of the audited blocks and tags, which thus requires the cloud to store both data blocks and tags for integrity verification. In this article, we present a compressive secure cloud storage protocol inspired by Goldreich-Goldwasser-Halevi (GGH) cryptosystem. Since the aggregated blocks can be reconstructed from the aggregated tags without the help of data indices, the cloud can only store data tags for providing the verifiable integrity proof. In this way, communication and storage costs can be hugely reduced and user private information can be hidden from the cloud. Furthermore, the proposed protocol only contains a few basic algebraic operations, making it highly efficient. We also provide formal security proof of the proposed protocol regarding forge, replay and replace attacks. In addition, we explore a new technique to support data dynamics. Furthermore, we establish a generic framework of compressive secure cloud storage protocols. Finally, we provide the theoretical analysis and experimental results, which further validate the effectiveness of the proposed protocol.
引用
收藏
页码:1197 / 1209
页数:13
相关论文
共 50 条
  • [41] A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol
    Jalil, Baidaa Abdulrahman
    Hasan, Taha Mohammed
    Mahmood, Ghassan Sabeeh
    Abed, Hazim Noman
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 4008 - 4021
  • [42] On the Security of a Cloud Data Storage Auditing Protocol IPAD
    Wang, Xu An
    Luo, Xiaoshuang
    Zhang, Jindan
    Yang, Xiaoyuan
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 611 - 617
  • [43] A Flexible Distributed Storage Integrity Auditing Mechanism in Cloud Computing
    Salma, T. J.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 283 - 287
  • [44] Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 331 - 346
  • [45] A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
    Tian, Junfeng
    Jing, Xuan
    [J]. IEEE ACCESS, 2019, 7 : 68071 - 68082
  • [46] A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
    Singh, Premlata
    Saroj, Sushil Kr
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 695 - 700
  • [47] An Efficient Provable Secure Public Auditing Scheme for Cloud Storage
    Xu, Chunxiang
    Zhang, Yuan
    Yu, Yong
    Zhang, Xiaojun
    Wen, Junwei
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4226 - 4241
  • [48] Public Auditing for Network Coding Based Secure Cloud Storage
    Liu, Xiang
    Huang, Jie
    Zong, Guowen
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 713 - 720
  • [49] Secure auditing and deduplication with efficient ownership management for cloud storage
    Wang, Min
    Xu, Lujun
    Hao, Rong
    Yang, Ming
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [50] Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
    Yuan, Jiawei
    Yu, Shucheng
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 145 - 153