An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage

被引:5
|
作者
Kumar, Mahender [1 ]
Maple, Carsten [1 ]
Chand, Satish [2 ]
机构
[1] Univ Warwick, Cyber Syst Engn Grp, WMG, Coventry, England
[2] Jawaharlal Nehru Univ, Delhi, India
关键词
Multi-cloud; Replacement attacks; Integrity auditing; Sensitive information; ID-Based cryptosystem; PROTOCOL; REPLICA;
D O I
10.1016/j.jksuci.2023.101745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of cloud storage brings forth significant difficulties in ensuring the integrity of data owners' sensitive data. Multi-cloud storage systems, which motive to enhance trustworthiness, are vulnerable to rigorous replacement attacks. These insidious attacks involve malicious actors substituting legitimate data with counterfeit versions, leading to compromised integrity and fraudulent audit outcomes. We propose a novel identity-based data integrity auditing protocol tailored for multi-cloud storage environments to tackle this challenge. Our protocol leverages a Third-Party Auditor (TPA) to delegate data authenticity and auditing responsibilities, employing identity-based blind signatures with a robust data recovery scheme. By eliminating the need for cumbersome public key certificate management, our solution effectively protects data owners' sensitive data while ensuring confidentiality across multiple cloud providers, thereby mitigating the risk of replacement attacks. A thorough security examination shows the proposed system resists forging, replacement attacks, and data confidentiality violations. A rigorous performance experiment also reveals outstanding computational and communication efficiency that outperforms current methods in tag production, proof generation, and verification. Our protocol offers an extraordinary balance of security and efficiency, making it particularly useful for auditing patent-sensitive data in multi-cloud storage. Our proposal provides a timely and effective way to protect sensitive data and prevent attackers in multi-cloud storage settings at a time when replacement attacks pose a serious concern. (c) 2023 The Authors. Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [32] Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage
    Garg, Neenu
    Nehra, Anushka
    Baza, Mohamed
    Kumar, Neeraj
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [33] Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
    Zhao, Chenbin
    Xu, Li
    Li, Jiguo
    Wang, Feng
    Fang, He
    IEEE ACCESS, 2019, 7 : 160459 - 160471
  • [34] Efficient Data Integrity Auditing Supporting Provable Data Update for Secure Cloud Storage
    Yang, Changsong
    Song, Bowen
    Ding, Yong
    Ou, Jiangtao
    Fan, Chengyuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [35] Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
    Zhang, Yue
    Yu, Jia
    Hao, Rong
    Wang, Cong
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 608 - 619
  • [36] DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage
    Zheng, Xiangshuo
    Shen, Wenting
    Su, Ye
    Gao, Yuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 299 - 316
  • [37] Cloud data integrity checking with an identity-based auditing mechanism from RSA
    Yu, Yong
    Xue, Liang
    Au, Man Ho
    Susilo, Willy
    Ni, Jianbing
    Zhang, Yafang
    Vasilakos, Athanasios V.
    Shen, Jian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 85 - 91
  • [38] Efficient TPA-based auditing scheme for secure cloud storage
    Bilin Shao
    Yanyan Ji
    Cluster Computing, 2021, 24 : 1989 - 2000
  • [39] Efficient TPA-based auditing scheme for secure cloud storage
    Shao, Bilin
    Ji, Yanyan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1989 - 2000
  • [40] An Efficient Public Batch Auditing Protocol for Data Security in Multi-Cloud Storage
    He Kai
    Huang Chuanhe
    Wang Jinhai
    Zhou Hao
    Chen Xi
    Lu Yilong
    Zhang Lianzhen
    Wang Bin
    2013 8TH CHINAGRID ANNUAL CONFERENCE (CHINAGRID), 2013, : 51 - 56