Efficient TPA-based auditing scheme for secure cloud storage

被引:0
|
作者
Bilin Shao
Yanyan Ji
机构
[1] Xi’an University of Architecture and Technology,School of Management
来源
Cluster Computing | 2021年 / 24卷
关键词
Cloud storage; Auditing protocol; Homomorphic MAC; Homomorphic signature;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, how to design efficient auditing protocol to verify the integrity of users’ data, which is stored in cloud services provider (CSP), becomes a research focus. Homomorphic message authentication code (MAC) and homomorphic signature are two popular techniques to respectively design private and public auditing protocols. On the one hand, it is not suitable for the homomorphic-MAC-based auditing protocols to be outsourced to third-party auditor (TPA), who has more professional knowledge and computational abilities, although they have high efficiencies. On the other hand, the homomorphic-signature-based ones are very suitable for employing TPA without compromising user’s signing key but have very low efficiency (compared to the former case). In this paper, we propose a new auditing protocol, which perfectly combines the advantages of above two cases. In particular, it is almost as efficient as a homomorphic-MAC-based protocol proposed by Zhang et al. recently. Moreover, it is also suitable for outsourcing to TPA because it does not compromise the privacy of users’ signing key, which can be seen from our security analysis. Finally, numerical analysis and experimental results demonstrate the high-efficiency of our protocol.
引用
收藏
页码:1989 / 2000
页数:11
相关论文
共 50 条
  • [21] An Efficient Auditing Scheme for Data Storage Security in Cloud
    Agarkhed, Jayashree
    Ashalatha, R.
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [22] An efficient certificateless public auditing scheme in cloud storage
    Gao, Gaimei
    Fei, Hongxia
    Qin, Zefeng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (24):
  • [23] Secure auditing and deduplication with efficient ownership management for cloud storage
    Wang, Min
    Xu, Lujun
    Hao, Rong
    Yang, Ming
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [24] User stateless privacy-preserving TPA auditing scheme for cloud storage
    Zhao, Haichun
    Yao, Xuanxia
    Zheng, Xuefeng
    Qiu, Tie
    Ning, Huansheng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 129 : 62 - 70
  • [25] Secure cloud storage auditing with deduplication and efficient data transfer
    Yu, Jingze
    Shen, Wenting
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2203 - 2215
  • [26] Secure cloud storage auditing with deduplication and efficient data transfer
    Jingze Yu
    Wenting Shen
    Cluster Computing, 2024, 27 : 2203 - 2215
  • [27] Secure public data auditing scheme for cloud storage in smart city
    Libing Wu
    Jing Wang
    Neeraj Kumar
    Debiao He
    Personal and Ubiquitous Computing, 2017, 21 : 949 - 962
  • [28] Secure public data auditing scheme for cloud storage in smart city
    Wu, Libing
    Wang, Jing
    Kumar, Neeraj
    He, Debiao
    PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 949 - 962
  • [29] An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR
    Zhou, Lei
    Fu, Anmin
    Feng, Jingyu
    Zhou, Chunyi
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [30] Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud
    Qingqing GAN
    Xiaoming WANG
    Xuefeng FANG
    Science China(Information Sciences), 2018, 61 (12) : 97 - 111