4.7 Article

Data Integrity Auditing without Private Key Storage for Secure Cloud Storage

期刊

IEEE TRANSACTIONS ON CLOUD COMPUTING
卷 9, 期 4, 页码 1408-1421

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCC.2019.2921553

关键词

Cloud storage; data integrity auditing; data security; biometric data

资金

  1. National Natural Science Foundation of China [61772311, 61572267, 61272091]
  2. National Cryptography Development Fund of China [MMJJ20170118]
  3. Open Project of Co-Innovation Center for Information Supply & Assurance Technology, Anhui University
  4. Open Project of the State Key Laboratory of Information Security, Institute of Information Engineering
  5. ARC Discovery grant [DP190103660]
  6. Chinese Academy of Sciences [2017-MS-21, 2017-MS-05]

向作者/读者索取更多资源

The text introduces a new data integrity auditing scheme that uses biometric data instead of private key storage hardware tokens, which improves security and efficiency in data storage.
Using cloud storage services, users can store their data in the cloud to avoid the expenditure of local data storage and maintenance. To ensure the integrity of the data stored in the cloud, many data integrity auditing schemes have been proposed. In most, if not all, of the existing schemes, a user needs to employ his private key to generate the data authenticators for realizing the data integrity auditing. Thus, the user has to possess a hardware token (e.g., USB token, smart card) to store his private key and memorize a password to activate this private key. If this hardware token is lost or this password is forgotten, most of the current data integrity auditing schemes would be unable to work. In order to overcome this problem, we propose a new paradigm called data integrity auditing without private key storage and design such a scheme. In this scheme, we use biometric data (e.g., iris scan, fingerprint) as the user's fuzzy private key to avoid using the hardware token. Meanwhile, the scheme can still effectively complete the data integrity auditing. We utilize a linear sketch with coding and error correction processes to confirm the identity of the user. In addition, we design a new signature scheme which not only supports blockless verifiability, but also is compatible with the linear sketch. The security proof and the performance analysis show that our proposed scheme achieves desirable security and efficiency.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据