Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage

被引:92
作者
Li, Jiguo [1 ,2 ]
Yan, Hao [3 ]
Zhang, Yichen [4 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Jinling Inst Technol, Coll Cyber Secur, Nanjing 211169, Peoples R China
[4] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 01期
基金
中国国家自然科学基金;
关键词
Cloud computing; Servers; Data integrity; Data privacy; Protocols; Data models; Cloud storage; identity-based cryptography; remote data checking; privacy preserving; ATTRIBUTE-BASED ENCRYPTION; DATA POSSESSION CHECKING; REVOCATION;
D O I
10.1109/JSYST.2020.2978146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although cloud storage service enables people easily maintain and manage amounts of data with lower cost, it cannot ensure the integrity of people's data. In order to audit the correctness of the data without downloading them, many remote data integrity checking (RDIC) schemes have been presented. Most existing schemes ignore the important issue of data privacy preserving and suffer from complicated certificate management derived from public key infrastructure. To overcome these shortcomings, this article proposes a new Identity-based RDIC scheme that makes use of homomorphic verifiable tag to decrease the system complexity. The original data in proof are masked by random integer addition, which protects the verifier from obtaining any knowledge about the data during the integrity checking process. Our scheme is proved secure under the assumption of computational Diffie-Hellman problem. Experiment result exhibits that our scheme is very efficient and feasible for real-life applications.
引用
收藏
页码:577 / 585
页数:9
相关论文
共 54 条
  • [1] Security in cloud computing: Opportunities and challenges
    Ali, Mazhar
    Khan, Samee U.
    Vasilakos, Athanasios V.
    [J]. INFORMATION SCIENCES, 2015, 305 : 357 - 383
  • [2] [Anonymous], 2004, IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), DOI [10.1007/1-4020-7901-X_1, DOI 10.1007/1-4020-7901-X_1]
  • [3] Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
  • [4] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [5] Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
  • [6] Bhadoria R., 2018, PROC CYBER SECURITY, P729
  • [7] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [8] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [9] Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    Buyya, Rajkumar
    Yeo, Chee Shin
    Venugopal, Srikumar
    Broberg, James
    Brandic, Ivona
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06): : 599 - 616
  • [10] DEKA GC, 2012, P IEEE 2 INT C PAR D, P44