File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TIFS.2016.2615853
- Scopus: eid_2-s2.0-85014919981
- WOS: WOS:000395447500001
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage
Title | Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage |
---|---|
Authors | |
Keywords | identity-based cryptography privacy preserving Cloud storage data integrity |
Issue Date | 2017 |
Citation | IEEE Transactions on Information Forensics and Security, 2017, v. 12, n. 4, p. 767-778 How to Cite? |
Abstract | © 2005-2012 IEEE. Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of RDIC protocols have been proposed in the literature, but most of the constructions suffer from the issue of a complex key management, that is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system complexity and the cost for establishing and managing the public key authentication framework in PKI-based RDIC schemes. We formalize ID-based RDIC and its security model, including security against a malicious cloud server and zero knowledge privacy against a third party verifier. The proposed ID-based RDIC protocol leaks no information of the stored data to the verifier during the RDIC process. The new construction is proven secure against the malicious server in the generic group model and achieves zero knowledge privacy against a verifier. Extensive security analysis and implementation results demonstrate that the proposed protocol is provably secure and practical in the real-world applications. |
Persistent Identifier | http://hdl.handle.net/10722/280621 |
ISSN | 2023 Impact Factor: 6.3 2023 SCImago Journal Rankings: 2.890 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yu, Yong | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Ateniese, Giuseppe | - |
dc.contributor.author | Huang, Xinyi | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Dai, Yuanshun | - |
dc.contributor.author | Min, Geyong | - |
dc.date.accessioned | 2020-02-17T14:34:30Z | - |
dc.date.available | 2020-02-17T14:34:30Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | IEEE Transactions on Information Forensics and Security, 2017, v. 12, n. 4, p. 767-778 | - |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280621 | - |
dc.description.abstract | © 2005-2012 IEEE. Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of RDIC protocols have been proposed in the literature, but most of the constructions suffer from the issue of a complex key management, that is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system complexity and the cost for establishing and managing the public key authentication framework in PKI-based RDIC schemes. We formalize ID-based RDIC and its security model, including security against a malicious cloud server and zero knowledge privacy against a third party verifier. The proposed ID-based RDIC protocol leaks no information of the stored data to the verifier during the RDIC process. The new construction is proven secure against the malicious server in the generic group model and achieves zero knowledge privacy against a verifier. Extensive security analysis and implementation results demonstrate that the proposed protocol is provably secure and practical in the real-world applications. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Information Forensics and Security | - |
dc.subject | identity-based cryptography | - |
dc.subject | privacy preserving | - |
dc.subject | Cloud storage | - |
dc.subject | data integrity | - |
dc.title | Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TIFS.2016.2615853 | - |
dc.identifier.scopus | eid_2-s2.0-85014919981 | - |
dc.identifier.volume | 12 | - |
dc.identifier.issue | 4 | - |
dc.identifier.spage | 767 | - |
dc.identifier.epage | 778 | - |
dc.identifier.isi | WOS:000395447500001 | - |
dc.identifier.issnl | 1556-6013 | - |