An improved identity-based public audit protocol for cloud storage

被引:1
|
作者
Wang, Haoming [1 ,2 ]
Zhang, Yuanhang [2 ]
Wang, Xu An [2 ,3 ]
Yang, Xiaoyuan [2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian, Shaanxi, Peoples R China
[2] Engn Univ Peoples Armed Police, Xian, Shaanxi, Peoples R China
[3] Xidian Univ, Xian, Shaanxi, Peoples R China
关键词
Security; Cloud computing; Cloud storage; Public integrity auditing; Blockchain;
D O I
10.1016/j.heliyon.2024.e36273
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid development of informatization, a vast amount of data is continuously generated and accumulated, leading to the emergence of cloud storage services. However, data stored in the cloud is beyond the control of users, posing various security risks. Cloud data auditing technology enables the inspection of data integrity in the cloud without the necessity of data downloading. Among these, public auditing schemes have experienced rapid development due to their ability to avoid additional user auditing expenses. However, malicious third-party auditors can compromise data privacy. This paper proposes an improved identity-based cloud auditing scheme that can resist malicious auditors. This scheme is also constructed on an identity-based public auditing scheme using blockchain to prevent malicious auditing. We found the scheme is not secure because a malicious cloud server can forge authentication tags for outsourced data blocks, while our scheme has not these security flaws. Through security proofs and performance analysis, we further demonstrate that our scheme is secure and efficient. Additionally, our scheme has typical application scenarios.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Wu, Li-bing
    Wang, Jing
    He, De-biao
    Khan, Muhammad-Khurram
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (12) : 1972 - 1977
  • [2] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Li-bing Wu
    Jing Wang
    De-biao He
    Muhammad-Khurram Khan
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1972 - 1977
  • [3] Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
    He, Debiao
    Wang, Huaqun
    Zhang, Jianhong
    Wang, Lina
    INFORMATION SCIENCES, 2017, 375 : 48 - 53
  • [4] Secure fuzzy identity-based public verification for cloud storage
    Xu, Yongliang
    Jin, Chunhua
    Qin, Wenyu
    Shan, Jinsong
    Jin, Ying
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 128
  • [5] Secure fuzzy identity-based public verification for cloud storage
    Xu, Yongliang
    Jin, Chunhua
    Qin, Wenyu
    Shan, Jinsong
    Jin, Ying
    Journal of Systems Architecture, 2022, 128
  • [6] Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage
    Cui, Yuanyou
    Su, Yunxuan
    Tu, Zheng
    Zhang, Jindan
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 469 - 479
  • [7] Secure Protocol for Identity-based Provable Data Possession in Cloud Storage
    Hunag, Cheng-Ta
    Yang, Cheng-Yu
    Weng, Chi-Yao
    Chen, Yen -Wen
    Wang, Shiuh-Jeng
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 327 - 331
  • [8] An identity-based public auditing protocol in cloud-assisted IoT
    Asal Ramezani
    Maryam Rajabzadeh Asaar
    Cluster Computing, 2022, 25 : 4339 - 4354
  • [9] An identity-based public auditing protocol in cloud-assisted IoT
    Ramezani, Asal
    Asaar, Maryam Rajabzadeh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 4339 - 4354
  • [10] Genuine and Secure Identity-Based Public Audit for the Stored Data in Healthcare Cloud
    Zhang, Jianhong
    Sun, Zhibin
    Mao, Jian
    JOURNAL OF HEALTHCARE ENGINEERING, 2018, 2018