An improved identity-based public audit protocol for cloud storage

被引:1
作者
Wang, Haoming [1 ,2 ]
Zhang, Yuanhang [2 ]
Wang, Xu An [2 ,3 ]
Yang, Xiaoyuan [2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian, Shaanxi, Peoples R China
[2] Engn Univ Peoples Armed Police, Xian, Shaanxi, Peoples R China
[3] Xidian Univ, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Cloud computing; Cloud storage; Public integrity auditing; Blockchain;
D O I
10.1016/j.heliyon.2024.e36273
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid development of informatization, a vast amount of data is continuously generated and accumulated, leading to the emergence of cloud storage services. However, data stored in the cloud is beyond the control of users, posing various security risks. Cloud data auditing technology enables the inspection of data integrity in the cloud without the necessity of data downloading. Among these, public auditing schemes have experienced rapid development due to their ability to avoid additional user auditing expenses. However, malicious third-party auditors can compromise data privacy. This paper proposes an improved identity-based cloud auditing scheme that can resist malicious auditors. This scheme is also constructed on an identity-based public auditing scheme using blockchain to prevent malicious auditing. We found the scheme is not secure because a malicious cloud server can forge authentication tags for outsourced data blocks, while our scheme has not these security flaws. Through security proofs and performance analysis, we further demonstrate that our scheme is secure and efficient. Additionally, our scheme has typical application scenarios.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Reliable Data Sharing Using Revocable-Storage Identity-Based Encryption in Cloud Storage
    Pathare, Kedar G.
    Chouragade, P. M.
    2017 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRICAL, ELECTRONICS AND COMPUTING TECHNOLOGIES (ICRTEECT), 2017, : 173 - 176
  • [22] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [23] Identity-based cloud storage integrity checking from lattices
    Tian M.
    Gao C.
    Chen J.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (04): : 128 - 139
  • [24] Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 577 - 585
  • [25] On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage
    Li, Xiong
    Liu, Shanpeng
    Lu, Rongxing
    Zhang, Xiaosong
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (06) : 975 - 977
  • [26] Identity-based multi-replicas data public audit scheme
    Yang, Xiaodong
    Pei, Xizhen
    Li, Ting
    Liu, Rui
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 711 - 714
  • [27] Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving
    Yan, Hao
    Gui, Wenming
    IEEE ACCESS, 2021, 9 (09): : 45822 - 45831
  • [28] An identity-based integrity verification scheme for cloud storage in 5G environment
    Wu, Zuodong
    Zhang, Jianwei
    Cai, Zengyu
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2020, 64 (02) : 168 - 177
  • [29] Identity-Based Integrity Verification and Public Auditing Scheme in Cloud Storage System Against Malicious Auditors
    Zhang, Haojue
    Yuan, Yilin
    Xin, Xianwei
    Qu, Yanbo
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2023, 30 (02): : 408 - 415
  • [30] Identity-based non-repudiable dynamic provable data possession in cloud storage
    Wang, Feng
    Xu, Li
    Wang, Huaqun
    Chen, Zhide
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 521 - 533