An improved identity-based public audit protocol for cloud storage

被引:1
作者
Wang, Haoming [1 ,2 ]
Zhang, Yuanhang [2 ]
Wang, Xu An [2 ,3 ]
Yang, Xiaoyuan [2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian, Shaanxi, Peoples R China
[2] Engn Univ Peoples Armed Police, Xian, Shaanxi, Peoples R China
[3] Xidian Univ, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Cloud computing; Cloud storage; Public integrity auditing; Blockchain;
D O I
10.1016/j.heliyon.2024.e36273
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid development of informatization, a vast amount of data is continuously generated and accumulated, leading to the emergence of cloud storage services. However, data stored in the cloud is beyond the control of users, posing various security risks. Cloud data auditing technology enables the inspection of data integrity in the cloud without the necessity of data downloading. Among these, public auditing schemes have experienced rapid development due to their ability to avoid additional user auditing expenses. However, malicious third-party auditors can compromise data privacy. This paper proposes an improved identity-based cloud auditing scheme that can resist malicious auditors. This scheme is also constructed on an identity-based public auditing scheme using blockchain to prevent malicious auditing. We found the scheme is not secure because a malicious cloud server can forge authentication tags for outsourced data blocks, while our scheme has not these security flaws. Through security proofs and performance analysis, we further demonstrate that our scheme is secure and efficient. Additionally, our scheme has typical application scenarios.
引用
收藏
页数:12
相关论文
共 50 条
[31]   An identity-based online/offline secure cloud storage auditing scheme [J].
Rabaninejad, Reyhaneh ;
Asaar, Maryam Rajabzadeh ;
Attari, Mahmoud Ahmadian ;
Aref, Mohammad Reza .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02) :1455-1468
[32]   An identity-based online/offline secure cloud storage auditing scheme [J].
Reyhaneh Rabaninejad ;
Maryam Rajabzadeh Asaar ;
Mahmoud Ahmadian Attari ;
Mohammad Reza Aref .
Cluster Computing, 2020, 23 :1455-1468
[33]   An improved public auditing protocol for cloud storage integrity checking [J].
Zhang, Jindan ;
Wang, Baocang .
INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2019, 15 (03) :282-303
[34]   A new identity-based public auditing against malicious auditor in the cloud [J].
Qian, Kun ;
Huang, Hui .
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (04) :452-460
[35]   DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage [J].
Zhang, Xiaojun ;
Zhao, Jie ;
Xu, Chunxiang ;
Wang, Huaxiong ;
Zhang, Yuan .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) :334-345
[36]   Identity-Based Authentication for Cloud Computing [J].
Li, Hongwei ;
Dai, Yuanshun ;
Tian, Ling ;
Yang, Haomiao .
CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 :157-166
[37]   Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption [J].
Saravanakumar, S. ;
Chitra, S. .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03) :985-996
[38]   Blockchain-Based Decentralized Public Auditing for Cloud Storage [J].
Shu, Jiangang ;
Zou, Xing ;
Jia, Xiaohua ;
Zhang, Weizhe ;
Xie, Ruitao .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) :2366-2380
[39]   Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud [J].
Deng, Hua ;
Qin, Zheng ;
Wu, Qianhong ;
Guan, Zhenyu ;
Deng, Robert H. ;
Wang, Yujue ;
Zhou, Yunya .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :3168-3180
[40]   Authorized Identity-Based Public Cloud Storage Auditing Scheme with Hierarchical Structure for Large-Scale User Groups [J].
Zhang, Yue ;
Zhang, Hanlin ;
Hao, Rong ;
Yu, Jia .
CHINA COMMUNICATIONS, 2018, 15 (11) :111-121