An identity-based online/offline secure cloud storage auditing scheme

被引:0
|
作者
Reyhaneh Rabaninejad
Maryam Rajabzadeh Asaar
Mahmoud Ahmadian Attari
Mohammad Reza Aref
机构
[1] K. N. Toosi University of Technology,Department of Electrical Engineering
[2] Islamic Azad University,Department of Electrical and Computer Engineering, Science and Research Branch
[3] Sharif University of Technology,Department of Electrical Engineering
来源
Cluster Computing | 2020年 / 23卷
关键词
Cloud storage; Data outsourcing; Public auditing; Online/offline provable data possession; Privacy-preserving; Identity-based cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud storage has significantly reduced data management costs for data owners. However, loss of physical control over the data after outsourcing, triggers some security concerns such as data integrity. Provable Data Possession (PDP) protocols, enable data owners to audit the integrity of their outsourced data without the need to retrieve the file from cloud server. However, most existing PDP schemes require resource-constrained users to perform costly operations for generating metadata on file blocks. In online/offline PDP mechanisms introduced most recently, the user’s computation is divided into online/offline phases, where the costly operations are allowed to be carried out in the offline phase. The users only require to perform lightweight operations in the real-time online phase. In this paper, we propose an identity-based (ID-based) online/offline PDP protocol which not only has lightweight computations at the users side, but also removes the complex certificate management/verification costs caused by expensive Public Key Infrastructure. The proposed scheme is based on an ID-based online/offline signature designed in this paper. The protocol is proven to be secure against a malicious cloud server in the random oracle model. We also prove the privacy preserving property of the protocol in the sense that it leaks no information of the outsourced data to the public verifier during the protocol execution. Moreover, our mechanism supports batch verification of multiple auditing tasks and fully dynamic data operations, efficiently. Experimental results demonstrate fine efficiency of our scheme in comparison to the recent proposals.
引用
收藏
页码:1455 / 1468
页数:13
相关论文
共 50 条
  • [1] An identity-based online/offline secure cloud storage auditing scheme
    Rabaninejad, Reyhaneh
    Asaar, Maryam Rajabzadeh
    Attari, Mahmoud Ahmadian
    Aref, Mohammad Reza
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1455 - 1468
  • [2] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    [J]. IEEE ACCESS, 2020, 8 : 206396 - 206405
  • [3] Enabling online/offline remote data auditing for secure cloud storage
    Gan, Qingqing
    Wang, Xiaoming
    Li, Jianwei
    Yan, Jiajun
    Li, Suyu
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3027 - 3041
  • [4] Enabling online/offline remote data auditing for secure cloud storage
    Qingqing Gan
    Xiaoming Wang
    Jianwei Li
    Jiajun Yan
    Suyu Li
    [J]. Cluster Computing, 2021, 24 : 3027 - 3041
  • [5] Identity-based remote data integrity auditing from lattices for secure cloud storage
    Yang, Songrun
    Chang, Jinyong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5833 - 5844
  • [6] Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9
    Lai, Jianchang
    Huang, Xinyi
    He, Debiao
    Wu, Wei
    [J]. COMPUTER JOURNAL, 2022, 65 (07): : 1692 - 1701
  • [7] An Efficient Identity-Based Online/Offline Encryption Scheme
    Liu, Joseph K.
    Zhou, Jianying
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 156 - 167
  • [8] Efficient Identity-based Public Auditing Scheme for Cloud Storage from Lattice Assumption
    Zhang, Xiaojun
    Xu, Chunxiang
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1819 - 1826
  • [9] Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage
    Cui, Yuanyou
    Su, Yunxuan
    Tu, Zheng
    Zhang, Jindan
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 469 - 479
  • [10] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Wu, Li-bing
    Wang, Jing
    He, De-biao
    Khan, Muhammad-Khurram
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (12) : 1972 - 1977