Remote Data Checking With a Designated Verifier in Cloud Storage

被引:59
|
作者
Yan, Hao [1 ,2 ]
Li, Jiguo [1 ,3 ]
Zhang, Yichen [4 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Peoples R China
[2] Jingling Inst Technol, Coll Cyber Secur, Nanjing 211100, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[4] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2020年 / 14卷 / 02期
基金
中国国家自然科学基金;
关键词
Cloud computing; Data integrity; Servers; Protocols; Indexes; Cascading style sheets; Cloud storage; data integrity checking; designated verifier; security; ATTRIBUTE-BASED ENCRYPTION; DATA POSSESSION CHECKING; PROVABLE DATA POSSESSION; SECURITY; REVOCATION; SIGNATURES; PROOFS; SCHEME;
D O I
10.1109/JSYST.2019.2918022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote data possession checking (RDPC) supplies an efficient manner to verify the integrity of the files stored in cloud storage. Public verification allows anyone to check the integrity of remote data so that it has a wider application in public cloud storage. Private verification just allows the data owner to verify the data integrity, which is mainly applied for the verification of secret data. However, in many real applications, the data owner expects a specific user to check the files in cloud storage, whereas others cannot execute such work. It is obvious that neither public verification nor private verification can satisfy such a requirement. To solve this issue, Ren et al. provided a designated-verifier provable data possession (DV-PDP) protocol. Unfortunately, the DV-PDP is insecure against replay attack launched by the malicious cloud server. To overcome this shortcoming, we present a new RDPC scheme with the designated verifier, in which the data owner specifies a unique verifier to check the data integrity. Based on the computational Diffie-Hellman assumption, we prove the security for our RDPC scheme in a random oracle model. The theoretical analysis and experiment results indicate that our scheme has less communication, storage, and computation overhead while achieving high error detection probability.
引用
收藏
页码:1788 / 1797
页数:10
相关论文
共 50 条
  • [21] Remote data possession checking with privacy-preserving authenticators for cloud storage
    Shen, Wenting
    Yang, Guangyang
    Yu, Jia
    Zhang, Hanlin
    Kong, Fanyu
    Hao, Rong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 76 : 136 - 145
  • [22] Enable Data Dynamics for Algebraic Signatures Based Remote Data Possession Checking in the Cloud Storage
    Luo Yuchuan
    Fu Shaojing
    Xu Ming
    Wang Dongsheng
    CHINA COMMUNICATIONS, 2014, 11 (11) : 114 - 124
  • [23] Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage
    Zhao, Yubo
    Chang, Jinyong
    COMPUTER NETWORKS, 2022, 216
  • [24] Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit
    Li, Ruifeng
    Wang, Xu An
    Yang, Haibin
    Niu, Ke
    Tang, Dianhua
    Yang, Xiaoyuan
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 8079 - 8089
  • [25] A Remote File Possession Checking Protocol in a Cloud Storage
    Deng, Zuojie
    Tan, Xiaolan
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (06): : 115 - 121
  • [26] A secure remote data integrity checking cloud storage system from threshold encryption
    Yao, Chuan
    Xu, Li
    Huang, Xinyi
    Liu, Joseph K.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2014, 5 (06) : 857 - 865
  • [27] Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
    Yong Yu
    Man Ho Au
    Yi Mu
    Shaohua Tang
    Jian Ren
    Willy Susilo
    Liju Dong
    International Journal of Information Security, 2015, 14 : 307 - 318
  • [28] A secure remote data integrity checking cloud storage system from threshold encryption
    Chuan Yao
    Li Xu
    Xinyi Huang
    Joseph K. Liu
    Journal of Ambient Intelligence and Humanized Computing, 2014, 5 : 857 - 865
  • [29] Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
    Liu, Zhangyun
    Liao, Yongjian
    Yang, Xiaowei
    He, Yichuan
    Zhao, Kun
    2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 128 - 135
  • [30] Retraction Note: Certificateless remote data integrity checking using lattices in cloud storage
    C. Sasikala
    C. Shoba Bindu
    Neural Computing and Applications, 2024, 36 (24) : 15177 - 15177