Efficient TPA-based auditing scheme for secure cloud storage

被引:0
|
作者
Bilin Shao
Yanyan Ji
机构
[1] Xi’an University of Architecture and Technology,School of Management
来源
Cluster Computing | 2021年 / 24卷
关键词
Cloud storage; Auditing protocol; Homomorphic MAC; Homomorphic signature;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, how to design efficient auditing protocol to verify the integrity of users’ data, which is stored in cloud services provider (CSP), becomes a research focus. Homomorphic message authentication code (MAC) and homomorphic signature are two popular techniques to respectively design private and public auditing protocols. On the one hand, it is not suitable for the homomorphic-MAC-based auditing protocols to be outsourced to third-party auditor (TPA), who has more professional knowledge and computational abilities, although they have high efficiencies. On the other hand, the homomorphic-signature-based ones are very suitable for employing TPA without compromising user’s signing key but have very low efficiency (compared to the former case). In this paper, we propose a new auditing protocol, which perfectly combines the advantages of above two cases. In particular, it is almost as efficient as a homomorphic-MAC-based protocol proposed by Zhang et al. recently. Moreover, it is also suitable for outsourcing to TPA because it does not compromise the privacy of users’ signing key, which can be seen from our security analysis. Finally, numerical analysis and experimental results demonstrate the high-efficiency of our protocol.
引用
收藏
页码:1989 / 2000
页数:11
相关论文
共 50 条
  • [1] Efficient TPA-based auditing scheme for secure cloud storage
    Shao, Bilin
    Ji, Yanyan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1989 - 2000
  • [2] Secure and Efficient Public Auditing scheme for Cloud Storage
    More, Swapnali S.
    Chaudhari, Sangita S.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 439 - 444
  • [3] An Efficient Provable Secure Public Auditing Scheme for Cloud Storage
    Xu, Chunxiang
    Zhang, Yuan
    Yu, Yong
    Zhang, Xiaojun
    Wen, Junwei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4226 - 4241
  • [4] A secure and efficient remote data auditing scheme for cloud storage
    El Ghoubach, Imad
    Ben Abbou, Rachid
    Mrabti, Fatiha
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (05) : 593 - 599
  • [5] Efficient and Secure Group based Collusion Resistant Public Auditing Scheme for Cloud Storage
    Chaudhari, Smita
    Swain, Gandharba
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (03) : 472 - 481
  • [6] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    S. Anbuchelian
    C. M. Sowmya
    C. Ramesh
    Cluster Computing, 2019, 22 : 9767 - 9775
  • [7] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [8] An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA
    Abu Salim
    Rajesh Kumar Tiwari
    Sachin Tripathi
    Wireless Personal Communications, 2021, 117 : 2929 - 2954
  • [9] An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA
    Salim, Abu
    Tiwari, Rajesh Kumar
    Tripathi, Sachin
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) : 2929 - 2954
  • [10] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713