Computer Science ›› 2023, Vol. 50 ›› Issue (7): 302-307.doi: 10.11896/jsjkx.220600067

• Information Security • Previous Articles     Next Articles

Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme

WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu   

  1. 1 School of Computer Science,Nanjing University of Posts & Telecommunications,Nanjing 210003,China
    2 Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks,Nanjing 210003,China
  • Received:2022-06-07 Revised:2022-12-12 Online:2023-07-15 Published:2023-07-05
  • About author:WANG Shaohui,born in 1977,Ph.D,vice-professor.His main research intere-sts include information security and applied cryptography.
  • Supported by:
    National Natural Science Foundation of China(61872192).

Abstract: Cloud storage services enable individuals or enterprises to easily maintain and manage large amounts of data at a low cost,but they cannot guarantee the integrity and privacy of outsourced data at the same time.The remote data integrity verification schemes allow users to verify the integrity of outsourced data without downloading all the data,that is,the cloud server can prove to the verifier that it is actually store the user′s data honestly.The security of an identity-based privacy preserving remote data integrity verification scheme proposed by Li et al.is analyzed.The analysis shows that the scheme is subjected to forgery attack,that is,the cloud server only needs to store a small amount of data to generate legitimate data integrity proof.Based on Li et al.’s scheme,a new identity-base remote data integrity verification scheme is proposed.The analysis shows that the new scheme can meet the security requirements of privacy and soundness,and the computational cost is basically comparable to that of Li et al.’s scheme.

Key words: Cloud storage, Data integrity, Privacy preserving, Identity-based cryptography, Data security

CLC Number: 

  • TP309
[1]DESWARTE Y,QUISQUATER J J,SAIDANE A.Remote Integrity Checking[C]//Working Conference on Integrity & Internal Control in Information Systems.Springer,2003:1-11.
[2]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores[C]//Proceedings of the 14th ACM Conference on Computer & Communications Security.2007:598-609.
[3]JUELS A,KALISKI JR B S.PORs:Proofs of Retrievability for Large Files[C]//Proceedings of the 14th ACM Conference on Computer & Communications Security.2007:584-597.
[4]SHACHAM H,WATERS B.Compact Proofs of Retrievability[C]//International Conference on the Theory & Application of Cryptology & Information Security.Springer,2008:90-107.
[5]ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalableand Efficient Provable Data Possession[C]//Proceedings of the 4th International Conference on Security & Privacy in Communication Networks.ACM,2008:1-10.
[6]WANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2010,22(5):847-859.
[7]SHEN W,YU J,XIA H,et al.Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium[J].Journal of Network & Computer Applications,2017,82:56-64.
[8]WANG H,WU Q,QIN B,et al.Identity-based remote data possession checking in public clouds[J].IET Information Security,2014,8(2):114-121.
[9]YU Y,MAN H A A,ATENIESE G,et al.Identity-based re-mote data integrity checking with perfect data privacy preserving for cloud storage[J].IEEE Transactions on Information Forensics and Security,2017,12(4):767-778.
[10]WANG H,HE D,TANG S.Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud[J].IEEE Transactions on Information Forensics and Security,2016,11(6):1165-1176.
[11]WANG Y,WU Q,QIN B,et.al.Identity-based data outsourcing with comprehensive auditing in clouds[J].IEEE Transactions on Information Forensics and Security,2016,12(4):940-952.
[12]ZHANG J,DONG Q.Efficient ID-based public auditing for the outsourced data in cloud storage[J].Information Sciences,2016,343:1-14.
[13]WANG H Q.Identity-based distributed provable data possession in multicloud storage[J].IEEE Transactions on Services Computing,2014,8(2):328-340.
[14]LI Y,YU Y,MIN G,et al.Fuzzy identity-based data integrity auditing for reliable cloud storage systems[J].IEEE Transactions on Dependable & Secure Computing,2017,16(1):72-83.
[15]LI J,YAN H,ZHANG Y.Identity-based privacy preserving remote data integrity checking for cloud storage[J].IEEE Systems Journal,2020,15(1):577-585.
[1] ZHAO Yuqi, YANG Min. Review of Differential Privacy Research [J]. Computer Science, 2023, 50(4): 265-276.
[2] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[3] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[4] WANG Jian. Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving [J]. Computer Science, 2022, 49(6A): 575-580.
[5] LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345.
[6] KONG Yu-ting, TAN Fu-xiang, ZHAO Xin, ZHANG Zheng-hang, BAI Lu, QIAN Yu-rong. Review of K-means Algorithm Optimization Based on Differential Privacy [J]. Computer Science, 2022, 49(2): 162-173.
[7] SHEN Zhen, ZHAO Cheng-gui. Storage Task Allocation Algorithm in Decentralized Cloud Storage Network [J]. Computer Science, 2022, 49(12): 17-21.
[8] YANG Hong-jian, HU Xue-xian, LI Ke-jia, XU Yang, WEI Jiang-hong. Study on Privacy-preserving Nonlinear Federated Support Vector Machines [J]. Computer Science, 2022, 49(12): 22-32.
[9] PENG Chun-chun, CHEN Yan-li, XUN Yan-mei. k-modes Clustering Guaranteeing Local Differential Privacy [J]. Computer Science, 2021, 48(2): 105-113.
[10] XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115.
[11] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[12] CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281.
[13] LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283.
[14] ZHANG Xi, WANG Jian. Public Integrity Auditing for Shared Data in Cloud Supporting User Identity Tracking [J]. Computer Science, 2020, 47(6): 303-309.
[15] LI Shu-quan,LIU Lei,ZHU Da-yong,XIONG Chao,LI Rui. Protocol of Dynamic Provable Data Integrity for Cloud Storage [J]. Computer Science, 2020, 47(2): 256-261.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!