Analysis and improvement on identity-based cloud data integrity verification scheme

被引:0
作者
Wang S. [1 ,2 ]
Pan X. [1 ,2 ]
Wang Z. [1 ,2 ]
Xiao F. [1 ,2 ]
Wang R. [1 ,2 ]
机构
[1] College of Computer, Nanjing University of Posts and Telecommunications, Nanjing
[2] Key Laboratory of Jiangsu High Technology Research for Wireless Sensor Network, Nanjing
来源
| 2018年 / Editorial Board of Journal on Communications卷 / 39期
基金
中国国家自然科学基金;
关键词
Cloud storage; Data integrity; Identity-based cryptosystem; Privacy;
D O I
10.11959/j.issn.1000-436x.2018229
中图分类号
学科分类号
摘要
Many individuals or businesses outsource their data to remote cloud. Cloud storage provides users the advantages of economic convenience, but data owners no longer physically control over the stored data, which introduces new security challenges, such as no security guarantees of integrity and privacy. The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed. It shows that Zhang et al. 's scheme is subjected to secret key recovery attack for the cloud servers can recover user's private key only utilizing stored data. And Xu et al. 's scheme cannot satisfy security requirements of soundness. Based on Xu et al. 's scheme, a modified identity-based cloud data integrity verification scheme is proposed. A comprehensive analysis shows the new scheme can provide the security requirements of soundness and privacy, and has the same communication overhead and computational cost as Xu et al. 's scheme. © 2018, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:98 / 105
页数:7
相关论文
共 13 条
  • [1] Deswarte Y., Quisquater J., Saidane A., Remote integrity checking, Integrity and Internal Control in Information Systems VI, pp. 1-11, (2004)
  • [2] Oprea A., Reiter M.K., Yang K., Space-efficient block storage integrity, Internet Society, Network and Distributed System Security Symposium, pp. 1-12, (2005)
  • [3] Ateniese G., Burns R., Curtmola R., Et al., Provable data possession at untrusted stores, ACM Conference on Computer and Communications Security, pp. 598-609, (2007)
  • [4] Ateniese G., Burns R., Curtmola R., Et al., Remote data checking using Provable data possession, ACM Transactions on Information & System Security(TISSEC), 14, 1, pp. 1-34, (2011)
  • [5] Juels A., Pors: proofs of retrievability for large files, ACM Conference on Computer and Communications Security, pp. 584-597, (2007)
  • [6] Shacham H., Waters B., Compact proofs of retrievability, Asiacrypt LNCS 5350, pp. 90-107, (2008)
  • [7] Shacham H., Waters B., Compact proofs of retrievability, Journal of Cryptology, 26, 3, pp. 442-483, (2013)
  • [8] Shamir A., Identity-based cryptosystems and signature schemes, pp. 47-53, (1984)
  • [9] Boneh D., Franklin M.K., Identity based encryption from the weil pairing, Siam Journal on Computing, 32, 3, pp. 213-229, (2001)
  • [10] Zhang J., Dong Q., Efficient ID-based public auditing for the outsourced data in cloud storage, Information Sciences, 343-344, C, pp. 1-14, (2016)