4.7 Article

Efficient ID-based public auditing for the outsourced data in cloud storage

期刊

INFORMATION SCIENCES
卷 343, 期 -, 页码 1-14

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2015.12.043

关键词

ID-based auditing; Security proof; The CDH problem; Simulation; Data integrity checking

资金

  1. Beijing Municipal Natural Science Foundation [4162020, 4132056]
  2. Importation and Development of High-Caliber Talents Project of Beijing municipal Institutions [CITTCD201304004]

向作者/读者索取更多资源

Cloud storage can make data users store and access their files anytime, from anywhere and with any device. To ensure the security of the outsourced data, data user needs to periodically check data integrity. The existing public auditing schemes are mainly based on the PIC (public key infrastructure). In this infrastructure, the auditor must validate the certificates of data user before auditing data integrity. Thus, it results in a large amount of computation cost. Especially, it brings heavy burden to the auditor in the, multi-user setting. To overcome this problem, in this paper, we propose an efficient ID-based auditing protocol for cloud data integrity based on ID-Based Cryptography, which is provably secure in the random oracle model and has tight security reduction. And we also extend it to support batch auditing in the multi-user setting. Finally, extensive security and simulation results show that our ID-based auditing protocols are secure and efficient, especially it reduces the computation cost of the auditor in the multi-user setting. In comparison with Wang et al.'s ID-based remote data possession checking protocol, our protocol is more suitable to the large-scale cloud storage system. (C) 2016 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据