An enhanced Data Possession Checking scheme using Identity Based Signature

被引:0
|
作者
Thayaambika, M. [1 ]
Rajakumar, Solomon Sylvia [1 ]
Kalpana, V. [1 ]
机构
[1] SASTRA Univ, CSE, Thanjavur, Tamil Nadu, India
关键词
integrity; Identity Based Signature(IBS); Merkle Hash Tree(MHT);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The phenomenon of cloud storage is to keep enormous amount of data available given by the user. The user has to be assured that the integrity of the data stored is intact. In order to ensure the integrity of the data, we have come up with a new scheme called an enhanced data possession checking using Identity Based Signature. In the earlier existing approaches, the time taken for key exchange is not considered because of which the efficiency of the overall working model is reduced. By introducing this scheme, the data that is stored using Merkle Hash Tree can avoid the waiting time as the user can generate his/her own public key using the Identity Based Signature. The Merkle Hash Tree is constructed and the root is evaluated by both cloud service provider and the data owner. In order to check the integrity of the data, the data owner asks for a specific block which returns the axillary path along with the file asked. The root computation is done and the external verifier compares the roots. The efficiency and the security of this new scheme is evaluated by both theoretical analyzing and simulation experiments. The obtained solution proves that our proposed scheme is secure and efficient.
引用
收藏
页码:941 / 944
页数:4
相关论文
共 50 条
  • [31] Identity-based signature scheme based on quadratic residues
    Chai ZhenChuan
    Cao ZhenFu
    Dong XiaoLei
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 373 - 380
  • [32] An efficient approach based on identity for distributed data possession in multicloud using SelCSP framework
    Ahemad, Shaikh Rahil
    Dole, Lalit
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [33] Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
    Yuan, Yilin
    Zhang, Zhenzhen
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [34] Identity-based signature scheme based on quadratic residues
    ZhenChuan Chai
    ZhenFu Cao
    XiaoLei Dong
    Science in China Series F: Information Sciences, 2007, 50 : 373 - 380
  • [35] Integrity verification using Identity based Provable Data Possession in multi storage cloud
    Rajendran, Annamalai
    Balasubramanian, V
    Mala, T.
    2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN DATA SCIENCE (ICCIDS), 2017,
  • [36] Identity-based signature scheme based on quadratic residues
    CHAI ZhenChuan
    Science in China(Series F:Information Sciences), 2007, (03) : 373 - 380
  • [37] A biometric identity based signature scheme with convenient verification
    Liu, Xiaodong
    Miao, Quan
    Li, Daxing
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 113 - 116
  • [38] A provable secure fuzzy identity based signature scheme
    Wang ChangJi
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (09) : 2139 - 2148
  • [39] A new identity-based group signature scheme
    Cheng, Xiangguo
    Guo, Lifeng
    Yu, Jia
    Ma, Huiran
    Wu, Yuexiu
    International Journal of Computers and Applications, 2013, 35 (01) : 1 - 5
  • [40] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    IEEE ACCESS, 2019, 7 : 153969 - 153976