4.6 Article

A Public Auditing Protocol for Cloud Storage System With Intrusion-Resilience

期刊

IEEE SYSTEMS JOURNAL
卷 14, 期 1, 页码 633-644

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2019.2923238

关键词

Auditing; cloud storage; intrusion-resilience; key-exposure

资金

  1. National Natural Science Foundation of China [61572001, 61872001, 61702005]
  2. Special Fund for Key Program of Science and Technology of Anhui Province, China [18030901027]
  3. Open Fund for Discipline Construction, Institute of Physical Science and Information Technology, Anhui University

向作者/读者索取更多资源

Cloud storage auditing helps users to check the integrity of their data stored on the cloud. However, if the client's auditing secret key is exposed to the malicious cloud, the client's data may be deleted by the malicious cloud without being detected. In this paper, we propose a public auditing protocol with intrusion-resilience to relieve damage caused by the key-exposure problem. The proposed protocol divides the lifetime of files stored on the cloud into several time periods, and each time period is further divided into several refreshing periods. The auditing secret key is updated in each time period, and secret values used to update the auditing secret key change in every refreshing period. These two update operations are completed by the client and the third party auditor (TPA). This protocol is secure against the adversary as long as the client and TPA are not compromised in the same refreshing period. Security proof under random oracle model proves the protocol is secure, and the experimental results indicate that the performance of the protocol is acceptable.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据