Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage

被引:4
作者
Garg, Neenu [1 ]
Nehra, Anushka [1 ]
Baza, Mohamed [2 ]
Kumar, Neeraj [1 ]
机构
[1] Thapar Inst Engn & Technol, Patiala, Punjab, India
[2] Coll Charleston, Dept Comp Sci, Charleston, SC 29401 USA
来源
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC | 2023年
关键词
cloud storage; data integrity; schnorr signarture; third party auditing;
D O I
10.1109/CCNC51644.2023.10059690
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a computing facility which allows its clients to outsource their information on distant cloud based servers without having the pressure of maintaining it. Of several remote data storage issues, data integrity preservation problem has gained much attention of researchers all over the world. Numerous research work has been done by researchers all over the world in the field of data integrity audit in cloud computing. Proposed work is an efficient and stable data integrity verification scheme based on Schnorr signatures. In Schnorr signatures, the signature verification equation is linear and also batch verification of several blocks is possible. Most existing schemes are based on Boneh Lynn and Shacham (BLS) and RSA signature schemes. However, in contrast with existing schemes, the proposed scheme is highly efficient and safe and pays lower verification computation costs proven experimentally in this paper.
引用
收藏
页数:6
相关论文
共 17 条
[1]  
Amiri W. A., 2020, CONSUM COMM NETWORK, P1, DOI DOI 10.1109/ccnc46108.2020.9045674
[2]  
Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI DOI 10.1145/1460877.1460889
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]  
Baza M., 2020, Connected and Autonomous Vehicles in Smart Cities
[5]  
Baza M., 2021, IEEE T VEHICULAR TEC
[6]   B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain [J].
Baza, Mohamed ;
Lasla, Noureddine ;
Mahmoud, Mohamed M. E. A. ;
Srivastava, Gautam ;
Abdallah, Mohamed .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02) :1214-1229
[7]   Dynamic Provable Data Possession [J].
Erway, C. Chris ;
Kupcu, Alptekin ;
Papamanthou, Charalampos ;
Tamassia, Roberto .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
[8]   An efficient data integrity auditing protocol for cloud computing [J].
Garg, Neenu ;
Bawa, Seema ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 :306-316
[9]   RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing [J].
Garg, Neenu ;
Bawa, Seema .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 84 :1-13
[10]   Comparative analysis of cloud data integrity auditing protocols [J].
Garg, Neenu ;
Bawa, Seema .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :17-32