Efficient TPA-based auditing scheme for secure cloud storage

被引:0
作者
Bilin Shao
Yanyan Ji
机构
[1] Xi’an University of Architecture and Technology,School of Management
来源
Cluster Computing | 2021年 / 24卷
关键词
Cloud storage; Auditing protocol; Homomorphic MAC; Homomorphic signature;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, how to design efficient auditing protocol to verify the integrity of users’ data, which is stored in cloud services provider (CSP), becomes a research focus. Homomorphic message authentication code (MAC) and homomorphic signature are two popular techniques to respectively design private and public auditing protocols. On the one hand, it is not suitable for the homomorphic-MAC-based auditing protocols to be outsourced to third-party auditor (TPA), who has more professional knowledge and computational abilities, although they have high efficiencies. On the other hand, the homomorphic-signature-based ones are very suitable for employing TPA without compromising user’s signing key but have very low efficiency (compared to the former case). In this paper, we propose a new auditing protocol, which perfectly combines the advantages of above two cases. In particular, it is almost as efficient as a homomorphic-MAC-based protocol proposed by Zhang et al. recently. Moreover, it is also suitable for outsourcing to TPA because it does not compromise the privacy of users’ signing key, which can be seen from our security analysis. Finally, numerical analysis and experimental results demonstrate the high-efficiency of our protocol.
引用
收藏
页码:1989 / 2000
页数:11
相关论文
共 52 条
[1]  
Jyoti A(2020)Dynamic provisioning of resources based on load balancing and service broker policy in cloud computing Clust. Comput. 23 377-395
[2]  
Shrimali M(2019)A new GLoSM embedded virtual machine model for big data services in cloud storage systems Clust. Comput. 22 399-405
[3]  
Kalai Arasan K(2019)Design and implementation of an efficient multi cloud storage approach for resource constrained modile devices Clust. Comput. 22 13143-13157
[4]  
Anandhakumar P(2014)On the security of an effieicent dynamic auditing protocol in cloud storage IEEE Trans. Parall. Distr. 25 2760-2761
[5]  
Kumar Bedi R(2005)The complexity of online memory checking Proc. FOCS 2005 573-584
[6]  
Singh J(2019)General transformations from single-genearation to multi-generation for homomorphic message authentication schemes in network coding Future Gener. Comput. Syst. 91 416-425
[7]  
Kumar Gupta S(2013)Compact proofs of retrievability J. Cryptogr. 26 442-483
[8]  
Ni J(2017)Provably secure cloud storage for mobile networks with less computation and smaller overhead Sci. China Inf. Sci. 60 122104-50868
[9]  
Yu Y(2019)RKA security of identity-based homomorphic signature scheme IEEE Access 7 50858-17841
[10]  
Mu Y(2020)RKA security for identity-based signature scheme IEEE Access 8 17833-20639