File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Cloud data integrity checking with an identity-based auditing mechanism from RSA

TitleCloud data integrity checking with an identity-based auditing mechanism from RSA
Authors
KeywordsProvable security
Data integrity
Identity-based signature
Cloud storage
Issue Date2016
Citation
Future Generation Computer Systems, 2016, v. 62, p. 85-91 How to Cite?
Abstract© 2016 Elsevier B.V. Cloud data auditing is extremely essential for securing cloud storage since it enables cloud users to verify the integrity of their outsourced data efficiently. The computation overheads on both the cloud server and the verifier can be significantly reduced by making use of data auditing because there is no necessity to retrieve the entire file but rather just use a spot checking technique. A number of cloud data auditing schemes have been proposed recently, but a majority of the proposals are based on Public Key Infrastructure (PKI). There are some drawbacks in these protocols: (1) It is mandatory to verify the validity of public key certificates before using any public key, which makes the verifier incur expensive computation cost. (2) Complex certificate management makes the whole protocol inefficient. To address the key management issues in cloud data auditing, in this paper, we propose ID-CDIC, an identity-based cloud data integrity checking protocol which can eliminate the complex certificate management in traditional cloud data integrity checking protocols. The proposed concrete construction from RSA signature can support variable-sized file blocks and public auditing. In addition, we provide a formal security model for ID-CDIC and prove the security of our construction under the RSA assumption with large public exponents in the random oracle model. We demonstrate the performance of our proposal by developing a prototype of the protocol. Implementation results show that the proposed ID-CDIC protocol is very practical and adoptable in real life.
Persistent Identifierhttp://hdl.handle.net/10722/280578
ISSN
2023 Impact Factor: 6.2
2023 SCImago Journal Rankings: 1.946
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorYu, Yong-
dc.contributor.authorXue, Liang-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorNi, Jianbing-
dc.contributor.authorZhang, Yafang-
dc.contributor.authorVasilakos, Athanasios V.-
dc.contributor.authorShen, Jian-
dc.date.accessioned2020-02-17T14:34:24Z-
dc.date.available2020-02-17T14:34:24Z-
dc.date.issued2016-
dc.identifier.citationFuture Generation Computer Systems, 2016, v. 62, p. 85-91-
dc.identifier.issn0167-739X-
dc.identifier.urihttp://hdl.handle.net/10722/280578-
dc.description.abstract© 2016 Elsevier B.V. Cloud data auditing is extremely essential for securing cloud storage since it enables cloud users to verify the integrity of their outsourced data efficiently. The computation overheads on both the cloud server and the verifier can be significantly reduced by making use of data auditing because there is no necessity to retrieve the entire file but rather just use a spot checking technique. A number of cloud data auditing schemes have been proposed recently, but a majority of the proposals are based on Public Key Infrastructure (PKI). There are some drawbacks in these protocols: (1) It is mandatory to verify the validity of public key certificates before using any public key, which makes the verifier incur expensive computation cost. (2) Complex certificate management makes the whole protocol inefficient. To address the key management issues in cloud data auditing, in this paper, we propose ID-CDIC, an identity-based cloud data integrity checking protocol which can eliminate the complex certificate management in traditional cloud data integrity checking protocols. The proposed concrete construction from RSA signature can support variable-sized file blocks and public auditing. In addition, we provide a formal security model for ID-CDIC and prove the security of our construction under the RSA assumption with large public exponents in the random oracle model. We demonstrate the performance of our proposal by developing a prototype of the protocol. Implementation results show that the proposed ID-CDIC protocol is very practical and adoptable in real life.-
dc.languageeng-
dc.relation.ispartofFuture Generation Computer Systems-
dc.subjectProvable security-
dc.subjectData integrity-
dc.subjectIdentity-based signature-
dc.subjectCloud storage-
dc.titleCloud data integrity checking with an identity-based auditing mechanism from RSA-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1016/j.future.2016.02.003-
dc.identifier.scopuseid_2-s2.0-84961276029-
dc.identifier.volume62-
dc.identifier.spage85-
dc.identifier.epage91-
dc.identifier.isiWOS:000377315900009-
dc.identifier.issnl0167-739X-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats