Certificateless Public Verification for the Outsourced Data Integrity in Cloud Storage

被引:10
作者
Huang, Longxia [1 ]
Zhou, Junlong [1 ]
Zhang, Gongxuan [1 ]
Sun, Jin [1 ]
Wang, Tian [1 ]
Vajdi, Ahmadreza [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless public verification; cloud storage; data security;
D O I
10.1142/S0218126618501815
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
By advances in cloud storage systems, users have access to the data saved in the cloud and can manipulate the data without limitation of time and place. As the data owner no longer possesses data physically, he is required to ensure the integrity of the data stored in the cloud with the public key given by public key infrastructure (PKI). Thus the security of PKI and certificates are essential. However, there are numerous security risks in the traditional PKI and it is complex to administer the certificates. Certificateless public key cryptography is used in this paper to solve these problems. We also use elliptic curve group to reduce computation overhead. In this paper, we design a certificateless public verification mechanism to check the integrity of data outsourced in the cloud and we further extend it to support a multiuser group by batch verification. Specifically, a public verifier who replaces the data owner to check the integrity in the proposed scheme does not require to manage any certificates during the verification process. Meanwhile, a verifier is not required to download the entire file for integrity checking. Theoretical analyses verify the security of our scheme and experimental results show its efficiency.
引用
收藏
页数:17
相关论文
共 26 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
[Anonymous], P ACM AUSTR COMP SCI
[3]  
[Anonymous], 2013, IEEE T COMPUT, DOI DOI 10.1109/TC.2011.245
[4]  
[Anonymous], 2020, IEEE T SERV COMPUT, DOI DOI 10.1109/TSC.2017.2665552
[5]  
[Anonymous], 2011, PBC PAIRING BASED CR
[6]  
[Anonymous], P 2017 IEEE INT C CO
[7]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[8]   Remote Data Checking Using Provable Data Possession [J].
Ateniese, Giuseppe ;
Burns, Randal ;
Curtmola, Reza ;
Herring, Joseph ;
Khan, Osama ;
Kissner, Lea ;
Peterson, Zachary ;
Song, Dawn .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
[9]   A Quantitative Analysis on Semantic Relations of Data Blocks in Storage Systems [J].
Chen, Yunliang ;
Li, Fangyuan ;
Du, Bo ;
Fan, Junqing ;
Deng, Ze .
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2015, 24 (08)
[10]  
[付安民 Fu Anmin], 2015, [计算机研究与发展, Journal of Computer Research and Development], V52, P2353