Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier

被引:4
|
作者
Bian, Genqing [1 ]
Zhang, Rui [1 ]
Shao, Bilin [2 ]
机构
[1] Xian Univ Architecture & Technol, Sch Informat & Control Engn, Xian 710055, Peoples R China
[2] Xian Univ Architecture & Technol, Sch Management, Xian 710055, Peoples R China
基金
中国国家自然科学基金;
关键词
Data privacy; Cloud computing; Data integrity; Security; Public key; Data models; Costs; Identity-based cryptography; designated verifier; privacy protection; data dynamics; PROVABLE DATA POSSESSION; DATA-STORAGE; CLOUD; SECURITY;
D O I
10.1109/ACCESS.2022.3166920
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The remote data possession checking mechanism can effectively verify the integrity of outsourced data, which can usually be divided into public verification and private verification. The verifier of public verification can be any cloud user, while private verification can only be the data owner. However, in most practical situations, the data owner expects that only a specific verifier can perform integrity checking tasks and that verifier cannot gain any knowledge about the data. Yan et al. proposed a remote data possession checking scheme with the designated verifier, which can guarantee that only the designated verifier can check data integrity, whereas others cannot do it. However, this scheme relies on public key infrastructure technology and does not consider data privacy protection issues. To overcome these shortcomings, we propose an identity-based remote data possession checking scheme that satisfies the data owner's requirement to specify a unique verifier. Moreover, in this scheme, we use a random integer to blind data integrity proof to protect data privacy and use Merkle hash tree structure to achieve dynamic update of data. At the same time, our scheme can avoid the complex certificate management in public key infrastructure. We proved the safety of our scheme based on the discrete logarithm assumption and the computational Diffie-Hellman assumption. Theoretical analysis and experimental results show that our scheme is feasible and effective in practical applications.
引用
收藏
页码:40556 / 40570
页数:15
相关论文
共 50 条
  • [1] Identity-based remote data checking with a designated verifier
    Yanyan Ji
    Bilin Shao
    Jinyong Chang
    Maozhi Xu
    Rui Xue
    [J]. Journal of Cloud Computing, 11
  • [2] Identity-based remote data checking with a designated verifier
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Xu, Maozhi
    Xue, Rui
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [3] Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 577 - 585
  • [4] Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
    Yu, Yong
    Au, Man Ho
    Ateniese, Giuseppe
    Huang, Xinyi
    Susilo, Willy
    Dai, Yuanshun
    Min, Geyong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 767 - 778
  • [5] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Yanyan Ji
    Bilin Shao
    Jinyong Chang
    Genqing Bian
    [J]. Cluster Computing, 2022, 25 : 337 - 349
  • [6] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    [J]. Cluster Computing, 2022, 25 (01) : 337 - 349
  • [7] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 337 - 349
  • [8] Identity-based universal designated verifier signatures
    Zhang, FG
    Susilo, W
    Mu, Y
    Chen, XF
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 825 - 834
  • [9] Identity-Based Quantum Designated Verifier Signature
    Xiangjun Xin
    Zhuo Wang
    Qinglan Yang
    Fagen Li
    [J]. International Journal of Theoretical Physics, 2020, 59 : 918 - 929
  • [10] Identity-Based Quantum Designated Verifier Signature
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    Li, Fagen
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (03) : 918 - 929