Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Academic communication|更新时间:2024-06-05
|
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Journal on CommunicationsVol. 36, Issue 10, Pages: 278-286(2015)
作者机构:
安徽大学 计算机科学与技术学院,安徽 合肥 230601
作者简介:
基金信息:
The National Natural Science Foundation of China(61173187);The National Natural Science Foundation of China(61173188);The National Natural Science Foundation of China(11301002);Specialized Research Fund for the Doctoral Program of Higher Education(20133401110004);The Natural Science Foundation of Anhui Province(11040606M141);The Natural Science Foundation of Anhui Province(1408085QF107);The “211” Project of Anhui University(33190187);The “211” Project of Anhui University(17110099)
Li YAN, Run-hua SHI, Hong ZHONG, et al. Integrity checking protocol with identity-based proxy signature in mobile cloud computing[J]. Journal on Communications, 2015, 36(10): 278-286.
DOI:
Li YAN, Run-hua SHI, Hong ZHONG, et al. Integrity checking protocol with identity-based proxy signature in mobile cloud computing[J]. Journal on Communications, 2015, 36(10): 278-286. DOI: 10.11959/j.issn.1000-436x.2015232.
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
a more perfect data integrity checking model for mobile cloud computing was proposed
in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore
for the proposed model
an identity-based proxy signature PDP(IBPS-PDP)protocol was presented.By using identity-based signatures
the system did not need to manage public key certificates and further the users did not need to take the additional computations to verify the other’s certificates yet.Finally
the security of the proposed IBPS-PDP protocol is proved in the random oracle model.
关键词
Keywords
references
JUELS A , KALISKI JR B S . PORs:proofs of retrievability for large files [A ] . Proceedings of the 14th ACM conference on Computer and Communications Security [C ] . ACM , 2007 . 584 - 597 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [J ] . Proceedings of CCS , 2007 , 10 : 598 - 609 .
SHACHAM H , WATERS B . Compact proofs of retrievability [A ] . Advances in Cryptology-ASIACRYPT [C ] . Springer Berlin Heidelberg , 2008 . 90 - 107 .
ERWAY C , KÜPÇÜ A , PAPAMANTHOU C , et al . Dynamic provable data possession [A ] . Proceedings of the 16th ACM Conference on Computer and Communications Security [C ] . ACM , 2009 . 213 - 222 .
WANG Q , WANG C , REN K , et al . Enabling public auditability and data dynamics for storage security in cloud computing [J ] . IEEE Transactions on Parallel and Distributed Systems , 2011 , 22 ( 5 ): 847 - 859 .
WANG C , CHOW S S M , WANG Q , et al . Privacy-preserving public auditing for secure cloud storage [J ] . IEEE Transactions on Computers , 2013 , 62 ( 2 ): 362 - 375 .
ZHENG Q , XU S . Fair and dynamic proofs of retrievability [A ] . Proceedings of the First ACM Conference on Data and Application Security and Privacy [C ] . ACM , 2011 . 237 - 248 .
YANG K , JIA X . An efficient and secure dynamic auditing protocol for data storage in cloud computing [J ] . IEEE Transactions on Parallel and Distributed Systems , 2013 , 24 ( 9 ): 1717 - 1726 .
HAO Z , ZHONG S , YU N . A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability [J ] . IEEE Transactions on Knowledge and Data Engineering , 2011 , 23 ( 9 ): 1432 - 1437 .
WANG C , WANG Q , REN K , et al . Privacy-preserving public auditing for data storage security in cloud computing [A ] . Proceedings IEEE INFOCOM [C ] . IEEE , 2010 . 1 - 9 .
ZHU Y , HU H , AHN G J , et al . Cooperative provable data possession for integrity verification in multicloud storage [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 12 ): 2231 - 2244 .
CURTMOLA R , KHAN O , BURNS R , et al . MR-PDP:multiple-replica provable data possession [A ] . The 28th International Conference on Distributed Computing Systems [C ] . IEEE , 2008 . 411 - 420 .
BOWERS K D , JUELS A , OPREA A . HAIL:a high-availability and integrity layer for cloud storage [A ] . Proceedings of the 16th ACM conference on Computer and Communications Security [C ] . ACM , 2009 . 187 - 198 .
HAO Z , YU N . A multiple-replica remote data possession checking protocol with public verifiability [A ] . 2010 Second International Symposium on Data,Privacy and E-Commerce(ISDPE) [C ] . IEEE , 2010 . 84 - 89 .
HE J , ZHANG Y , HUANG G , et al . Distributed data possession checking for securing multiple replicas in geographically-dispersed clouds [J ] . Journal of Computer and System Sciences , 2012 , 78 ( 5 ): 1345 - 1358 .
ZHAO J , XU C , LI F , et al . Identity-based public verification with privacy-preserving for data storage security in cloud computing [J ] . IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences , 2013 , 96 ( 12 ): 2709 - 2716 .
WANG H . Identity-based distributed provable data possession in multicloud storage [J ] . Services Computing,IEEE Transactions on , 2015 , 8 ( 2 ): 328 - 340 .