A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol

被引:14
作者
Jalil, Baidaa Abdulrahman [1 ]
Hasan, Taha Mohammed [1 ]
Mahmood, Ghassan Sabeeh [1 ]
Abed, Hazim Noman [1 ]
机构
[1] Univ Diyala, Coll Sci, Comp Sci Dept, Diyala, Iraq
关键词
Cloudcomputing; Publicauditing; Privacypreserving; Third-partyauditor;
D O I
10.1016/j.jksuci.2021.04.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a model that enables users to store their data remotely and enjoy the applications and services provided by this model on demand through a common set of configurable computing resources, without the burden of local data storage as well as maintenance. However, users no longer have physical possession of external data, and this makes the task of protecting data integrity in cloud computing extre-mely important so that users can use the cloud storage as if it were local, without worrying about the need to verify its integrity. Hence, public cloud storage auditing is critical, so users can use a Third -party auditor (TPA) to verify data integrity. In order to provide effective TPA security, the audit should not achieves any security vulnerabilities to the privacy of user data and does not provide any additional online burden to the user. In this paper, we propose an effective public auditing system for cloud data based on the signature of Boneh-Lynn-Shacham (BLS), in order to ensure public auditing and maintain data privacy. The proposed system also realizes batch auditing and data dynamic process. In addition, the proposed system enhances the level of security authentication through an Automatic Blocker Protocol (ABP) to protect the system from unauthorized TPA. An extensive security and performance analysis shows that the proposed system is very secure and effective (c) 2021 The Authors. Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:4008 / 4021
页数:14
相关论文
共 29 条
  • [1] Alrabea A., 2020, J KING SAUD U COMPUT, V4, P1388
  • [2] Ateniese G., 2008, PROC 4 INT C SECUR P
  • [3] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [4] Dynamic Provable Data Possession
    Erway, C. Chris
    Kupcu, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
  • [5] An efficient data integrity auditing protocol for cloud computing
    Garg, Neenu
    Bawa, Seema
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 306 - 316
  • [6] Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
    Ge, Xinrui
    Yu, Jia
    Zhang, Hanlin
    Hu, Chengyu
    Li, Zengpeng
    Qin, Zhan
    Hao, Rong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 490 - 504
  • [7] Outsourced dynamic provable data possession with batch update for secure cloud storage
    Guo, Wei
    Zhang, Hua
    Qin, Sujuan
    Gao, Fei
    Jin, Zhengping
    Li, Wenmin
    Wen, Qiaoyan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 : 309 - 322
  • [8] Offline privacy preserving proxy re-encryption in mobile cloud computing
    Koe, Arthur Sandor Voundi
    Lin, Yaping
    [J]. PERVASIVE AND MOBILE COMPUTING, 2019, 59
  • [9] Blockchain-based public auditing for big data in cloud storage
    Li, Jiaxing
    Wu, Jigang
    Jiang, Guiyuan
    Srikanthan, Thambipillai
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2020, 57 (06)
  • [10] Privacy preserving cloud data auditing with efficient key update
    Li, Yannan
    Yu, Yong
    Yang, Bo
    Min, Geyong
    Wu, Huai
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 789 - 798