An improved identity-based public audit protocol for cloud storage

被引:1
|
作者
Wang, Haoming [1 ,2 ]
Zhang, Yuanhang [2 ]
Wang, Xu An [2 ,3 ]
Yang, Xiaoyuan [2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian, Shaanxi, Peoples R China
[2] Engn Univ Peoples Armed Police, Xian, Shaanxi, Peoples R China
[3] Xidian Univ, Xian, Shaanxi, Peoples R China
关键词
Security; Cloud computing; Cloud storage; Public integrity auditing; Blockchain;
D O I
10.1016/j.heliyon.2024.e36273
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid development of informatization, a vast amount of data is continuously generated and accumulated, leading to the emergence of cloud storage services. However, data stored in the cloud is beyond the control of users, posing various security risks. Cloud data auditing technology enables the inspection of data integrity in the cloud without the necessity of data downloading. Among these, public auditing schemes have experienced rapid development due to their ability to avoid additional user auditing expenses. However, malicious third-party auditors can compromise data privacy. This paper proposes an improved identity-based cloud auditing scheme that can resist malicious auditors. This scheme is also constructed on an identity-based public auditing scheme using blockchain to prevent malicious auditing. We found the scheme is not secure because a malicious cloud server can forge authentication tags for outsourced data blocks, while our scheme has not these security flaws. Through security proofs and performance analysis, we further demonstrate that our scheme is secure and efficient. Additionally, our scheme has typical application scenarios.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving
    Yan, Hao
    Gui, Wenming
    IEEE ACCESS, 2021, 9 (09): : 45822 - 45831
  • [32] Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
    Zhang, Xiaojun
    Wang, Huaxiong
    Xu, Chunxiang
    INFORMATION SCIENCES, 2019, 472 : 223 - 234
  • [33] Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
    Zhao, Chenbin
    Xu, Li
    Li, Jiguo
    Wang, Feng
    Fang, He
    IEEE ACCESS, 2019, 7 : 160459 - 160471
  • [34] An identity-based online/offline secure cloud storage auditing scheme
    Rabaninejad, Reyhaneh
    Asaar, Maryam Rajabzadeh
    Attari, Mahmoud Ahmadian
    Aref, Mohammad Reza
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1455 - 1468
  • [35] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    IEEE ACCESS, 2020, 8 : 206396 - 206405
  • [36] An identity-based online/offline secure cloud storage auditing scheme
    Reyhaneh Rabaninejad
    Maryam Rajabzadeh Asaar
    Mahmoud Ahmadian Attari
    Mohammad Reza Aref
    Cluster Computing, 2020, 23 : 1455 - 1468
  • [37] An improved public auditing protocol for cloud storage integrity checking
    Zhang, Jindan
    Wang, Baocang
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2019, 15 (03) : 282 - 303
  • [38] A new identity-based public auditing against malicious auditor in the cloud
    Qian, Kun
    Huang, Hui
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (04) : 452 - 460
  • [39] Incentive Public Auditing Scheme with Identity-Based Designated Verifier in Cloud
    Shao, Bilin
    Zhang, Li
    Bian, Genqing
    ELECTRONICS, 2023, 12 (06)
  • [40] DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
    Zhang, Xiaojun
    Zhao, Jie
    Xu, Chunxiang
    Wang, Huaxiong
    Zhang, Yuan
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 334 - 345