An enhanced Data Possession Checking scheme using Identity Based Signature

被引:0
|
作者
Thayaambika, M. [1 ]
Rajakumar, Solomon Sylvia [1 ]
Kalpana, V. [1 ]
机构
[1] SASTRA Univ, CSE, Thanjavur, Tamil Nadu, India
关键词
integrity; Identity Based Signature(IBS); Merkle Hash Tree(MHT);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The phenomenon of cloud storage is to keep enormous amount of data available given by the user. The user has to be assured that the integrity of the data stored is intact. In order to ensure the integrity of the data, we have come up with a new scheme called an enhanced data possession checking using Identity Based Signature. In the earlier existing approaches, the time taken for key exchange is not considered because of which the efficiency of the overall working model is reduced. By introducing this scheme, the data that is stored using Merkle Hash Tree can avoid the waiting time as the user can generate his/her own public key using the Identity Based Signature. The Merkle Hash Tree is constructed and the root is evaluated by both cloud service provider and the data owner. In order to check the integrity of the data, the data owner asks for a specific block which returns the axillary path along with the file asked. The root computation is done and the external verifier compares the roots. The efficiency and the security of this new scheme is evaluated by both theoretical analyzing and simulation experiments. The obtained solution proves that our proposed scheme is secure and efficient.
引用
收藏
页码:941 / 944
页数:4
相关论文
共 50 条
  • [1] Identity-based remote data possession checking in public clouds
    Wang, Huaqun
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    IET INFORMATION SECURITY, 2014, 8 (02) : 114 - 121
  • [2] An Identity-Set-Based Provable Data Possession Scheme
    Lin, Changlu
    Luo, Fucai
    Luo, Jinglong
    Liu, Yali
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 606 - 618
  • [3] Multiple Replica based Remote Data Possession Checking Scheme based on Matrix Representation of Data
    Balamurugan, B.
    Mandadi, Akhil Reddy
    Mohan, Sabana
    Faahtheima, Sherein
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [4] A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage
    Zhao, Jining
    Xu, Chunxiang
    Chen, Kefei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (09): : 4576 - 4598
  • [5] An identity-based ring signature scheme with enhanced privacy
    Gamage, Chandana
    Gras, Ben
    Crispo, Bruno
    Tanenbaum, Andrew S.
    2006 SECURECOMM AND WORKSHOPS, 2006, : 257 - +
  • [6] On the Security of a Remote Data Possession Checking Scheme in Cloud Storage
    Liang, XinLong
    Jiang, Rui
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 96 - 99
  • [7] Remote Data Checking Using Provable Data Possession
    Ateniese, Giuseppe
    Burns, Randal
    Curtmola, Reza
    Herring, Joseph
    Khan, Osama
    Kissner, Lea
    Peterson, Zachary
    Song, Dawn
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [8] Remote data possession checking with enhanced security for cloud storage
    Yu, Yong
    Zhang, Yafang
    Ni, Jianbing
    Au, Man Ho
    Chen, Lanxiang
    Liu, Hongyu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 77 - 85
  • [9] A biometric identity based signature scheme
    Computer Security and Cryptography Group, Computer Science Department NUI Maynooth, Co. Kildare, Ireland
    Int. J. Netw. Secur., 2007, 3 (317-326):
  • [10] A Fuzzy Identity Based Signature Scheme
    Wang, Changji
    Chen, Wei
    Liu, Yang
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 554 - 558