Efficient TPA-based auditing scheme for secure cloud storage

被引:0
|
作者
Bilin Shao
Yanyan Ji
机构
[1] Xi’an University of Architecture and Technology,School of Management
来源
Cluster Computing | 2021年 / 24卷
关键词
Cloud storage; Auditing protocol; Homomorphic MAC; Homomorphic signature;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, how to design efficient auditing protocol to verify the integrity of users’ data, which is stored in cloud services provider (CSP), becomes a research focus. Homomorphic message authentication code (MAC) and homomorphic signature are two popular techniques to respectively design private and public auditing protocols. On the one hand, it is not suitable for the homomorphic-MAC-based auditing protocols to be outsourced to third-party auditor (TPA), who has more professional knowledge and computational abilities, although they have high efficiencies. On the other hand, the homomorphic-signature-based ones are very suitable for employing TPA without compromising user’s signing key but have very low efficiency (compared to the former case). In this paper, we propose a new auditing protocol, which perfectly combines the advantages of above two cases. In particular, it is almost as efficient as a homomorphic-MAC-based protocol proposed by Zhang et al. recently. Moreover, it is also suitable for outsourcing to TPA because it does not compromise the privacy of users’ signing key, which can be seen from our security analysis. Finally, numerical analysis and experimental results demonstrate the high-efficiency of our protocol.
引用
收藏
页码:1989 / 2000
页数:11
相关论文
共 50 条
  • [31] Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud
    Gan, Qingqing
    Wang, Xiaoming
    Fang, Xuefeng
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (12)
  • [32] An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage
    Su, Haonan
    Zheng, Dong
    Zhang, Yinghui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 833 - 836
  • [33] Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud
    Qingqing Gan
    Xiaoming Wang
    Xuefeng Fang
    Science China Information Sciences, 2018, 61
  • [34] An Efficient Public Auditing Scheme for Multi-Cloud Storage
    Yu, Haiyang
    Cai, Yongquan
    Kong, Shanshan
    Xue, Fei
    Allah, Ditta
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 81 - 96
  • [35] An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
    Yang, Kan
    Jia, Xiaohua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (09) : 1717 - 1726
  • [36] Public Auditing for Network Coding Based Secure Cloud Storage
    Liu, Xiang
    Huang, Jie
    Zong, Guowen
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 713 - 720
  • [37] On the security of auditing mechanisms for secure cloud storage
    Yu, Yong
    Niu, Lei
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 127 - 132
  • [38] An efficient and secure public batch auditing protocol for dynamic cloud storage data
    Yang, Liu
    Xia, Lili
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 671 - 675
  • [39] An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
    Tian, Jun-Feng
    Wang, Hao-Ning
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [40] Efficient Identity-based Public Auditing Scheme for Cloud Storage from Lattice Assumption
    Zhang, Xiaojun
    Xu, Chunxiang
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1819 - 1826