Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage

被引:92
作者
Li, Jiguo [1 ,2 ]
Yan, Hao [3 ]
Zhang, Yichen [4 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Jinling Inst Technol, Coll Cyber Secur, Nanjing 211169, Peoples R China
[4] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 01期
基金
中国国家自然科学基金;
关键词
Cloud computing; Servers; Data integrity; Data privacy; Protocols; Data models; Cloud storage; identity-based cryptography; remote data checking; privacy preserving; ATTRIBUTE-BASED ENCRYPTION; DATA POSSESSION CHECKING; REVOCATION;
D O I
10.1109/JSYST.2020.2978146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although cloud storage service enables people easily maintain and manage amounts of data with lower cost, it cannot ensure the integrity of people's data. In order to audit the correctness of the data without downloading them, many remote data integrity checking (RDIC) schemes have been presented. Most existing schemes ignore the important issue of data privacy preserving and suffer from complicated certificate management derived from public key infrastructure. To overcome these shortcomings, this article proposes a new Identity-based RDIC scheme that makes use of homomorphic verifiable tag to decrease the system complexity. The original data in proof are masked by random integer addition, which protects the verifier from obtaining any knowledge about the data during the integrity checking process. Our scheme is proved secure under the assumption of computational Diffie-Hellman problem. Experiment result exhibits that our scheme is very efficient and feasible for real-life applications.
引用
收藏
页码:577 / 585
页数:9
相关论文
共 54 条
  • [31] Wang, 2012, Proc. 10th Intl Conf. Applied Cryptography and Network Security, P507, DOI DOI 10.1007/978-3-642-31284-7_30
  • [32] Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (01) : 92 - 106
  • [33] Wang BY, 2014, IEEE T CLOUD COMPUT, V2, P43, DOI [10.1109/CLOUD.2012.46, 10.1109/TCC.2014.2299807]
  • [34] DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding
    Wang, Chaokun
    Wang, Changping
    Wang, Zheng
    Ye, Xiaojun
    Yu, Jeffrey Xu
    Wang, Bin
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (12) : 2277 - 2291
  • [35] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [36] Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
    Wang, Huaqun
    He, Debiao
    Tang, Shaohua
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1165 - 1176
  • [37] Identity-Based Distributed Provable Data Possession in Multicloud Storage
    Wang, Huaqun
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (02) : 328 - 340
  • [38] Identity-based remote data possession checking in public clouds
    Wang, Huaqun
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    [J]. IET INFORMATION SECURITY, 2014, 8 (02) : 114 - 121
  • [39] Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
    Wang, Qian
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    Li, Jin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (05) : 847 - 859
  • [40] Remote Data Checking With a Designated Verifier in Cloud Storage
    Yan, Hao
    Li, Jiguo
    Zhang, Yichen
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1788 - 1797