File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.future.2016.02.003
- Scopus: eid_2-s2.0-84961276029
- WOS: WOS:000377315900009
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Cloud data integrity checking with an identity-based auditing mechanism from RSA
Title | Cloud data integrity checking with an identity-based auditing mechanism from RSA |
---|---|
Authors | |
Keywords | Provable security Data integrity Identity-based signature Cloud storage |
Issue Date | 2016 |
Citation | Future Generation Computer Systems, 2016, v. 62, p. 85-91 How to Cite? |
Abstract | © 2016 Elsevier B.V. Cloud data auditing is extremely essential for securing cloud storage since it enables cloud users to verify the integrity of their outsourced data efficiently. The computation overheads on both the cloud server and the verifier can be significantly reduced by making use of data auditing because there is no necessity to retrieve the entire file but rather just use a spot checking technique. A number of cloud data auditing schemes have been proposed recently, but a majority of the proposals are based on Public Key Infrastructure (PKI). There are some drawbacks in these protocols: (1) It is mandatory to verify the validity of public key certificates before using any public key, which makes the verifier incur expensive computation cost. (2) Complex certificate management makes the whole protocol inefficient. To address the key management issues in cloud data auditing, in this paper, we propose ID-CDIC, an identity-based cloud data integrity checking protocol which can eliminate the complex certificate management in traditional cloud data integrity checking protocols. The proposed concrete construction from RSA signature can support variable-sized file blocks and public auditing. In addition, we provide a formal security model for ID-CDIC and prove the security of our construction under the RSA assumption with large public exponents in the random oracle model. We demonstrate the performance of our proposal by developing a prototype of the protocol. Implementation results show that the proposed ID-CDIC protocol is very practical and adoptable in real life. |
Persistent Identifier | http://hdl.handle.net/10722/280578 |
ISSN | 2023 Impact Factor: 6.2 2023 SCImago Journal Rankings: 1.946 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yu, Yong | - |
dc.contributor.author | Xue, Liang | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Ni, Jianbing | - |
dc.contributor.author | Zhang, Yafang | - |
dc.contributor.author | Vasilakos, Athanasios V. | - |
dc.contributor.author | Shen, Jian | - |
dc.date.accessioned | 2020-02-17T14:34:24Z | - |
dc.date.available | 2020-02-17T14:34:24Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Future Generation Computer Systems, 2016, v. 62, p. 85-91 | - |
dc.identifier.issn | 0167-739X | - |
dc.identifier.uri | http://hdl.handle.net/10722/280578 | - |
dc.description.abstract | © 2016 Elsevier B.V. Cloud data auditing is extremely essential for securing cloud storage since it enables cloud users to verify the integrity of their outsourced data efficiently. The computation overheads on both the cloud server and the verifier can be significantly reduced by making use of data auditing because there is no necessity to retrieve the entire file but rather just use a spot checking technique. A number of cloud data auditing schemes have been proposed recently, but a majority of the proposals are based on Public Key Infrastructure (PKI). There are some drawbacks in these protocols: (1) It is mandatory to verify the validity of public key certificates before using any public key, which makes the verifier incur expensive computation cost. (2) Complex certificate management makes the whole protocol inefficient. To address the key management issues in cloud data auditing, in this paper, we propose ID-CDIC, an identity-based cloud data integrity checking protocol which can eliminate the complex certificate management in traditional cloud data integrity checking protocols. The proposed concrete construction from RSA signature can support variable-sized file blocks and public auditing. In addition, we provide a formal security model for ID-CDIC and prove the security of our construction under the RSA assumption with large public exponents in the random oracle model. We demonstrate the performance of our proposal by developing a prototype of the protocol. Implementation results show that the proposed ID-CDIC protocol is very practical and adoptable in real life. | - |
dc.language | eng | - |
dc.relation.ispartof | Future Generation Computer Systems | - |
dc.subject | Provable security | - |
dc.subject | Data integrity | - |
dc.subject | Identity-based signature | - |
dc.subject | Cloud storage | - |
dc.title | Cloud data integrity checking with an identity-based auditing mechanism from RSA | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/j.future.2016.02.003 | - |
dc.identifier.scopus | eid_2-s2.0-84961276029 | - |
dc.identifier.volume | 62 | - |
dc.identifier.spage | 85 | - |
dc.identifier.epage | 91 | - |
dc.identifier.isi | WOS:000377315900009 | - |
dc.identifier.issnl | 0167-739X | - |