An improved identity-based public audit protocol for cloud storage

被引:1
作者
Wang, Haoming [1 ,2 ]
Zhang, Yuanhang [2 ]
Wang, Xu An [2 ,3 ]
Yang, Xiaoyuan [2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian, Shaanxi, Peoples R China
[2] Engn Univ Peoples Armed Police, Xian, Shaanxi, Peoples R China
[3] Xidian Univ, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Cloud computing; Cloud storage; Public integrity auditing; Blockchain;
D O I
10.1016/j.heliyon.2024.e36273
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid development of informatization, a vast amount of data is continuously generated and accumulated, leading to the emergence of cloud storage services. However, data stored in the cloud is beyond the control of users, posing various security risks. Cloud data auditing technology enables the inspection of data integrity in the cloud without the necessity of data downloading. Among these, public auditing schemes have experienced rapid development due to their ability to avoid additional user auditing expenses. However, malicious third-party auditors can compromise data privacy. This paper proposes an improved identity-based cloud auditing scheme that can resist malicious auditors. This scheme is also constructed on an identity-based public auditing scheme using blockchain to prevent malicious auditing. We found the scheme is not secure because a malicious cloud server can forge authentication tags for outsourced data blocks, while our scheme has not these security flaws. Through security proofs and performance analysis, we further demonstrate that our scheme is secure and efficient. Additionally, our scheme has typical application scenarios.
引用
收藏
页数:12
相关论文
共 50 条
[41]   Authorized Identity-Based Public Cloud Storage Auditing Scheme with Hierarchical Structure for Large-Scale User Groups [J].
Zhang, Yue ;
Zhang, Hanlin ;
Hao, Rong ;
Yu, Jia .
CHINA COMMUNICATIONS, 2018, 15 (11) :111-121
[42]   Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage [J].
Li, Jiguo ;
Yan, Hao ;
Zhang, Yichen .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) :356-365
[43]   Identity-Based Encryption with Cloud Revocation Authority and Its Applications [J].
Tseng, Yuh-Min ;
Tsai, Tung-Tso ;
Huang, Sen-Shan ;
Huang, Chung-Peng .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (04) :1041-1053
[44]   Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem [J].
Xu, Jian ;
Yu, Yanbo ;
Meng, Qingyu ;
Wu, Qiyu ;
Zhou, Fucai .
MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04) :1475-1492
[45]   An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems [J].
Li, Xiong ;
Shang, Shuai ;
Liu, Shanpeng ;
Gu, Ke ;
Jan, Mian Ahmad ;
Zhang, Xiaosong ;
Khan, Fazlullah .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) :2556-2567
[46]   Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem [J].
Jian Xu ;
Yanbo Yu ;
Qingyu Meng ;
Qiyu Wu ;
Fucai Zhou .
Mobile Networks and Applications, 2021, 26 :1475-1492
[47]   A Blockchain and Edge Computing Based Public Audit Scheme for Cloud Storage [J].
Wang, Jinpeng ;
Wang, Sai ;
Wang, Lianhai ;
Shao, Wei ;
Xu, Shujiang ;
Zhang, Shuhui .
2022 41ST CHINESE CONTROL CONFERENCE (CCC), 2022, :7466-7470
[48]   Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information [J].
Yang, Yang ;
Chen, Yanjiao ;
Chen, Fei ;
Chen, Jing .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) :10434-10445
[49]   A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage [J].
Luo, Wei ;
Ma, Wenping .
CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 :519-530
[50]   An identity-based integrity verification scheme for cloud storage in 5G environment [J].
Wu Z. ;
Zhang J. ;
Cai Z. .
Zhang, Jianwei (mailzjw@163.com), 1600, Inderscience Publishers (64) :168-177