Analysis and improvement on identity-based cloud data integrity verification scheme
Papers|更新时间:2024-06-05
|
Analysis and improvement on identity-based cloud data integrity verification scheme
Journal on CommunicationsVol. 39, Issue 11, Pages: 98-105(2018)
作者机构:
1. 南京邮电大学计算机学院、软件学院、网络空间安全学院,江苏 南京 210003
2. 江苏省无线传感网高技术研究重点实验室,江苏 南京 210003
作者简介:
基金信息:
The National Natural Science Foundation of China(61373006);The National Natural Science Foundation of China(61373139);The National Natural Science Foundation of China(61672016);The National Natural Science Foundation of China(61872192);The National Natural Science Foundation of China(61003236)
Shaohui WANG, Xiaoxiao PAN, Zhiwei WANG, et al. Analysis and improvement on identity-based cloud data integrity verification scheme[J]. Journal on Communications, 2018, 39(11): 98-105.
DOI:
Shaohui WANG, Xiaoxiao PAN, Zhiwei WANG, et al. Analysis and improvement on identity-based cloud data integrity verification scheme[J]. Journal on Communications, 2018, 39(11): 98-105. DOI: 10.11959/j.issn.1000-436x.2018229.
Analysis and improvement on identity-based cloud data integrity verification scheme
Many individuals or businesses outsource their data to remote cloud.Cloud storage provides users the advantages of economic convenience
but data owners no longer physically control over the stored data
which introduces new security challenges
such as no security guarantees of integrity and privacy.The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed.It shows that Zhang et al.’s scheme is subjected to secret key recovery attack for the cloud servers can recover user’s private key only utilizing stored data.And Xu et al.’s scheme cannot satisfy security requirements of soundness.Based on Xu et al.'s scheme
a modified identity-based cloud data integrity verification scheme is proposed.A comprehensive analysis shows the new scheme can provide the security requirements of soundness and privacy
and has the same communication overhead and computational cost as Xu et al.’s scheme.
关键词
Keywords
references
DESWARTE Y , QUISQUATER J , SAIDANE A . Remote integrity checking [M ] // Integrity and Internal Control in Information Systems VI . 2004 : 1 - 11 .
OPREA A , REITER M K , YANG K . Space-efficient block storage integrity [C ] // Internet Society,Network and Distributed System Security Symposium . 2005 : 1 - 12 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [C ] // ACM Conference on Computer and Communications Security . 2007 : 598 - 609 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Remote data checking using Provable data possession [J ] . ACM Transactions on Information & System Security(TISSEC) , 2011 , 14 ( 1 ): 1 - 34 .
JUELS A , . Pors:proofs of retrievability for large files [C ] // ACM Conference on Computer and Communications Security . 2007 : 584 - 597 .
SHACHAM H , WATERS B . Compact proofs of retrievability [C ] // Asiacrypt LNCS 5350 . 2008 : 90 - 107 .
SHACHAM H , WATERS B . Compact proofs of retrievability [J ] . Journal of Cryptology , 2013 , 26 ( 3 ): 442 - 483 .
SHAMIR A , . Identity-based cryptosystems and signature schemes [C ] // Crypto . 1984 : 47 - 53 .
BONEH D , FRANKLIN M K . Identity based encryption from the weil pairing [J ] . Siam Journal on Computing , 2001 , 32 ( 3 ): 213 - 229 .
ZHANG J , DONG Q . Efficient ID-based public auditing for the outsourced data in cloud storage [J ] . Information Sciences , 2016 , 343-344(C) : 1 - 14 .
YU Y , XUE L , MAN H A , et al . Cloud data integrity checking with an identity-based auditing mechanism from RSA [J ] . Future Generation Computer Systems , 2016 , 62 ( C ): 85 - 91 .
ZHANG J , LI P , SUN Z , et al . ID-based data integrity auditing scheme from RSA with resisting key exposure [C ] // International Conference on Provable Security . 2016 : 83 - 100 .
XU Z , WU L , KHAN M K , et al . A secure and efficient public auditing scheme using RSA algorithm for cloud storage [J ] . Journal of Supercomputing , 2017 ( 4 ): 1 - 25 .