An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage

被引:5
|
作者
Kumar, Mahender [1 ]
Maple, Carsten [1 ]
Chand, Satish [2 ]
机构
[1] Univ Warwick, Cyber Syst Engn Grp, WMG, Coventry, England
[2] Jawaharlal Nehru Univ, Delhi, India
关键词
Multi-cloud; Replacement attacks; Integrity auditing; Sensitive information; ID-Based cryptosystem; PROTOCOL; REPLICA;
D O I
10.1016/j.jksuci.2023.101745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of cloud storage brings forth significant difficulties in ensuring the integrity of data owners' sensitive data. Multi-cloud storage systems, which motive to enhance trustworthiness, are vulnerable to rigorous replacement attacks. These insidious attacks involve malicious actors substituting legitimate data with counterfeit versions, leading to compromised integrity and fraudulent audit outcomes. We propose a novel identity-based data integrity auditing protocol tailored for multi-cloud storage environments to tackle this challenge. Our protocol leverages a Third-Party Auditor (TPA) to delegate data authenticity and auditing responsibilities, employing identity-based blind signatures with a robust data recovery scheme. By eliminating the need for cumbersome public key certificate management, our solution effectively protects data owners' sensitive data while ensuring confidentiality across multiple cloud providers, thereby mitigating the risk of replacement attacks. A thorough security examination shows the proposed system resists forging, replacement attacks, and data confidentiality violations. A rigorous performance experiment also reveals outstanding computational and communication efficiency that outperforms current methods in tag production, proof generation, and verification. Our protocol offers an extraordinary balance of security and efficiency, making it particularly useful for auditing patent-sensitive data in multi-cloud storage. Our proposal provides a timely and effective way to protect sensitive data and prevent attackers in multi-cloud storage settings at a time when replacement attacks pose a serious concern. (c) 2023 The Authors. Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:12
相关论文
共 50 条
  • [41] An efficient and secure protocol for checking remote data integrity in multi-cloud environment
    Anwarbasha, H.
    Kumar, S. Sasi
    Dhanasekaran, D.
    SCIENTIFIC REPORTS, 2021, 11 (01)
  • [42] An efficient and secure protocol for checking remote data integrity in multi-cloud environment
    H. Anwarbasha
    S. Sasi Kumar
    D. Dhanasekaran
    Scientific Reports, 11
  • [43] Identity-based public data integrity verification scheme in cloud storage system via blockchain
    Yilin Yuan
    Jianbiao Zhang
    Wanshan Xu
    Zheng Li
    The Journal of Supercomputing, 2022, 78 : 8509 - 8530
  • [44] Identity-based public data integrity verification scheme in cloud storage system via blockchain
    Yuan, Yilin
    Zhang, Jianbiao
    Xu, Wanshan
    Li, Zheng
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (06): : 8509 - 8530
  • [45] Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
    Zhang, Xingjun
    Si, Wei
    IEEE ACCESS, 2021, 9 : 37951 - 37960
  • [46] Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy
    Yu, Haiyang
    Cai, Yongquan
    Kong, Shanshan
    Ning, Zhenhu
    Xue, Fei
    Zhong, Han
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (10): : 5019 - 5041
  • [47] Analysis and improvement on identity-based cloud data integrity verification scheme
    Wang S.
    Pan X.
    Wang Z.
    Xiao F.
    Wang R.
    2018, Editorial Board of Journal on Communications (39): : 98 - 105
  • [48] Efficient Identity-Based Multi-Cloud Security Access Control in Distributed Environments
    Yakoob, S. K.
    Reddy, V. Krishna
    INTERNATIONAL JOURNAL OF E-COLLABORATION, 2023, 19 (03)
  • [49] Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
    He, Debiao
    Wang, Huaqun
    Zhang, Jianhong
    Wang, Lina
    INFORMATION SCIENCES, 2017, 375 : 48 - 53
  • [50] Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data
    Tian, Hui
    Peng, Fang
    Quan, Hanyu
    Chang, Chin-Chen
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)