Efficient TPA-based auditing scheme for secure cloud storage

被引:4
作者
Shao, Bilin [1 ]
Ji, Yanyan [1 ]
机构
[1] Xian Univ Architecture & Technol, Sch Management, Xian 710055, Shaanxi, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2021年 / 24卷 / 03期
基金
中国国家自然科学基金;
关键词
Cloud storage; Auditing protocol; Homomorphic MAC; Homomorphic signature; PROTOCOL; DESIGN;
D O I
10.1007/s10586-021-03239-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, how to design efficient auditing protocol to verify the integrity of users' data, which is stored in cloud services provider (CSP), becomes a research focus. Homomorphic message authentication code (MAC) and homomorphic signature are two popular techniques to respectively design private and public auditing protocols. On the one hand, it is not suitable for the homomorphic-MAC-based auditing protocols to be outsourced to third-party auditor (TPA), who has more professional knowledge and computational abilities, although they have high efficiencies. On the other hand, the homomorphic-signature-based ones are very suitable for employing TPA without compromising user's signing key but have very low efficiency (compared to the former case). In this paper, we propose a new auditing protocol, which perfectly combines the advantages of above two cases. In particular, it is almost as efficient as a homomorphic-MAC-based protocol proposed by Zhang et al. recently. Moreover, it is also suitable for outsourcing to TPA because it does not compromise the privacy of users' signing key, which can be seen from our security analysis. Finally, numerical analysis and experimental results demonstrate the high-efficiency of our protocol.
引用
收藏
页码:1989 / 2000
页数:12
相关论文
共 29 条
[21]   On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage [J].
Ni, Jianbing ;
Yu, Yong ;
Mu, Yi ;
Xia, Qi .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (10) :2760-2761
[22]   Compact Proofs of Retrievability [J].
Shacham, Hovav ;
Waters, Brent .
JOURNAL OF CRYPTOLOGY, 2013, 26 (03) :442-483
[23]   Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage [J].
Tian, Hui ;
Chen, Yuxiang ;
Chang, Chin-Chen ;
Jiang, Hong ;
Huang, Yongfeng ;
Chen, Yonghong ;
Liu, Jin .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) :701-714
[24]   Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing [J].
Wang, Qian ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing ;
Li, Jin .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (05) :847-859
[25]   A Tag Encoding Scheme against Pollution Attack to Linear Network Coding [J].
Wu, Xiaohu ;
Xu, Yinlong ;
Yuen, Chau ;
Xiang, Liping .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :33-42
[26]   Identity-based public auditing for cloud storage systems against malicious auditors via blockchain [J].
Xue, Jingting ;
Xu, Chunxiang ;
Zhao, Jining ;
Ma, Jianfeng .
SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (03)
[27]   A general framework to design secure cloud storage protocol using homomorphic, encryption scheme [J].
Zhang, Jian ;
Yang, Yang ;
Chen, Yanjiao ;
Chen, Jing ;
Zhang, Qian .
COMPUTER NETWORKS, 2017, 129 :37-50
[28]   Provably secure cloud storage for mobile networks with less computation and smaller overhead [J].
Zhang, Rui ;
Ma, Hui ;
Lu, Yao ;
Li, Yang .
SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (12)
[29]   Dynamic Audit Services for Outsourced Storages in Clouds [J].
Zhu, Yan ;
Ahn, Gail-Joon ;
Hu, Hongxin ;
Yau, Stephen S. ;
An, Ho G. ;
Hu, Chang-Jun .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2013, 6 (02) :227-238