Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage

被引:8
|
作者
Wang, Feng [1 ,2 ,3 ,4 ]
Xu, Li [1 ,2 ]
Li, Jiguo [1 ,2 ]
Choo, Kim-Kwang Raymond [5 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fuzhou, Fujian, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
[3] Fujian Univ Technol, Sch Comp Sci & Math, Fuzhou 350118, Fujian, Peoples R China
[4] Fujian Univ Technol, Fujian Prov Key Lab Big Data Min & Applicat, Fuzhou 350118, Fujian, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
关键词
Public/private auditing; lightweight auditing schemes; resource-constrained end devices; cloud storage services; SIGNATURE; CHECKING; PROOFS;
D O I
10.1109/TCC.2020.3045806
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data integrity protection, an important feature in cloud storage services, can be achieved using auditing schemes. However, existing public and private auditing schemes are somewhat inefficient in practice. For example, in private auditing schemes, the trusted third-party is generally not able to settle disputes between users and the cloud storage server. In most existing public auditing schemes, it takes a user tens of seconds to generate data tags for every MB of file outsourced, which is clearly impractical particularly on resource-constrained end devices. Since the user is likely to have information than the auditor, we divide the verification phase into private verification and public verification phases. Then, we propose a public/private auditing model and a security model for public/private auditing. In our public/private auditing model, the user uses private verification phase to audit outsourced data promptly in most cases, and the auditor uses public verification phase to audit outsourced data only when dispute occurs or the user is not available to audit. Then, we propose a public/private auditing scheme, and present its security proof in the random oracle model under the discrete logarithm assumption. Experimental findings demonstrate that our scheme only need tens of microseconds to generate data tags for every MB file outsourced. In other words, the efficiency of our scheme is almost as high as existing high-performing private auditing schemes, and our scheme is more effective in comparison to existing efficient public auditing schemes.
引用
收藏
页码:2704 / 2716
页数:13
相关论文
共 50 条
  • [1] A public cloud storage auditing scheme for resource-constrained clients
    Shen W.
    Yu J.
    Hao R.
    Wang X.
    Yu, Jia (qduyujia@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06): : 121 - 130
  • [2] Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices
    Zhou, Lei
    Fu, Anmin
    Yang, Guomin
    Gao, Yansong
    Yu, Shui
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4325 - 4342
  • [3] Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices
    Noura, Hassan
    Couturier, Raphael
    Pham, Congduc
    Chehab, Ali
    2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [4] A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation
    Shen, Wenting
    Yu, Jia
    Hao, Rong
    Wang, Xu An
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 36 - 39
  • [5] Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices
    Ibrahim, Nahla
    Agbinya, Johnson
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [6] A Lightweight XMPP Publish/Subscribe Scheme for Resource-Constrained IoT Devices
    Wang, Heng
    Xiong, Daijin
    Wang, Ping
    Liu, Yuqiang
    IEEE ACCESS, 2017, 5 : 16393 - 16405
  • [7] Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage
    Wang, Feng
    Xu, Li
    Choo, Kim-Kwang Raymond
    Zhang, Yuexin
    Wang, Huaqun
    Li, Jiguo
    IEEE ACCESS, 2020, 8 : 2258 - 2271
  • [8] Lightweight Strong PUF for Resource-Constrained Devices
    Korona, Mateusz
    Giermakowski, Radoslaw
    Biernacki, Mateusz
    Rawski, Mariusz
    ELECTRONICS, 2024, 13 (02)
  • [9] Lightweight blockchain consensus mechanism and storage optimization for resource-constrained IoT devices
    Li, Chunlin
    Zhang, Jing
    Yang, Xianmin
    Luo Youlong
    INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (04)
  • [10] Public Data Auditing with Constrained Auditing Number for Cloud Storage
    Yang, Guangyang
    Xia, Hui
    Shen, Wenting
    Jiang, Xiuxiu
    Yu, Jia
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 21 - 32