Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage

被引:4
作者
Garg, Neenu [1 ]
Nehra, Anushka [1 ]
Baza, Mohamed [2 ]
Kumar, Neeraj [1 ]
机构
[1] Thapar Inst Engn & Technol, Patiala, Punjab, India
[2] Coll Charleston, Dept Comp Sci, Charleston, SC 29401 USA
来源
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC | 2023年
关键词
cloud storage; data integrity; schnorr signarture; third party auditing;
D O I
10.1109/CCNC51644.2023.10059690
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a computing facility which allows its clients to outsource their information on distant cloud based servers without having the pressure of maintaining it. Of several remote data storage issues, data integrity preservation problem has gained much attention of researchers all over the world. Numerous research work has been done by researchers all over the world in the field of data integrity audit in cloud computing. Proposed work is an efficient and stable data integrity verification scheme based on Schnorr signatures. In Schnorr signatures, the signature verification equation is linear and also batch verification of several blocks is possible. Most existing schemes are based on Boneh Lynn and Shacham (BLS) and RSA signature schemes. However, in contrast with existing schemes, the proposed scheme is highly efficient and safe and pays lower verification computation costs proven experimentally in this paper.
引用
收藏
页数:6
相关论文
共 17 条
  • [1] Amiri W.A., 2020, 2020 IEEE 17 ANN CON, P1, DOI DOI 10.1109/CCNC46108.2020.9045674
  • [2] Ateniese G, 2008, P 4 INT C SEC PRIV C, P1
  • [3] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [4] Baza M., 2020, CONNECTED AUTONOMOUS
  • [5] Baza M., 2021, IEEE T VEHICULAR TEC
  • [6] B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain
    Baza, Mohamed
    Lasla, Noureddine
    Mahmoud, Mohamed M. E. A.
    Srivastava, Gautam
    Abdallah, Mohamed
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1214 - 1229
  • [7] Dynamic Provable Data Possession
    Erway, C. Chris
    Kupcu, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
  • [8] An efficient data integrity auditing protocol for cloud computing
    Garg, Neenu
    Bawa, Seema
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 306 - 316
  • [9] RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing
    Garg, Neenu
    Bawa, Seema
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 84 : 1 - 13
  • [10] Comparative analysis of cloud data integrity auditing protocols
    Garg, Neenu
    Bawa, Seema
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 17 - 32