An enhanced Data Possession Checking scheme using Identity Based Signature

被引:0
|
作者
Thayaambika, M. [1 ]
Rajakumar, Solomon Sylvia [1 ]
Kalpana, V. [1 ]
机构
[1] SASTRA Univ, CSE, Thanjavur, Tamil Nadu, India
关键词
integrity; Identity Based Signature(IBS); Merkle Hash Tree(MHT);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The phenomenon of cloud storage is to keep enormous amount of data available given by the user. The user has to be assured that the integrity of the data stored is intact. In order to ensure the integrity of the data, we have come up with a new scheme called an enhanced data possession checking using Identity Based Signature. In the earlier existing approaches, the time taken for key exchange is not considered because of which the efficiency of the overall working model is reduced. By introducing this scheme, the data that is stored using Merkle Hash Tree can avoid the waiting time as the user can generate his/her own public key using the Identity Based Signature. The Merkle Hash Tree is constructed and the root is evaluated by both cloud service provider and the data owner. In order to check the integrity of the data, the data owner asks for a specific block which returns the axillary path along with the file asked. The root computation is done and the external verifier compares the roots. The efficiency and the security of this new scheme is evaluated by both theoretical analyzing and simulation experiments. The obtained solution proves that our proposed scheme is secure and efficient.
引用
收藏
页码:941 / 944
页数:4
相关论文
共 50 条
  • [41] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [42] Identity oriented signature scheme based on quadratic residues
    Qiu, WD
    Chen, KF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 235 - 242
  • [43] Comments on an identity-based signature scheme for VANETs
    Song, Yaqing
    Xu, Chunxiang
    Zhang, Yuan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112
  • [44] Identity based strong designated verifier signature scheme
    Kancharla, Phani Kumar
    Gummadidala, Shailaja
    INFORMATICA, 2007, 18 (02) : 239 - 252
  • [45] Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
    Yilin Yuan
    Zhenzhen Zhang
    Scientific Reports, 13
  • [46] A provable secure fuzzy identity based signature scheme
    WANG ChangJi 1
    2 Guangdong Province Information Security Key Laboratory
    ScienceChina(InformationSciences), 2012, 55 (09) : 2139 - 2148
  • [47] Identity-based authenticated blind signature scheme
    Department of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 20009, China
    不详
    Jisuanji Gongcheng, 2006, 14 (136-137):
  • [48] An identity-based signature scheme for mobile business
    Wang, Maocai
    Hu, Hanping
    Dai, Guangming
    ICIC Express Letters, 2010, 4 (02): : 565 - 569
  • [49] A new blind identity-based signature scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 114 - 119
  • [50] A New Special Biometric Identity Based Signature Scheme
    Liu, Xiaodong
    Miao, Quan
    Li, Daxing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (01): : 13 - 18