Identity-based key-exposure resilient cloud storage public auditing scheme from lattices

2019 ◽  
Vol 472 ◽  
pp. 223-234 ◽  
Author(s):  
Xiaojun Zhang ◽  
Huaxiong Wang ◽  
Chunxiang Xu
2020 ◽  
Vol 2020 ◽  
pp. 1-13 ◽  
Author(s):  
S. Mary Virgil Nithya ◽  
V. Rhymend Uthariaraj

Secured storage system is a critical component in cloud computing. Cloud clients use cloud auditing schemes to verify the integrity of data stored in the cloud. But with the exposure of the auditing secret key to the Cloud Service Provider, cloud auditing becomes unsuccessful, however strong the auditing schemes may be. Therefore, it is essential to prevent the exposure of auditing secret keys, and even if it happens, it is necessary to minimize the damage caused. The existing cloud auditing schemes that are strongly resilient to key exposure are based on Public Key Infrastructure and so have challenges of certificate management/verification. These schemes also incur high computation time during integrity verification of the data blocks. The Identity-based schemes eliminate the usage of certificates but limit the damage due to key exposure, only in time periods earlier to the time period of the exposed key. Some of the key exposure resilient schemes do not provide support for batch auditing. In this paper, an Identity-based Provable Data Possession scheme is proposed. It protects the security of Identity-based cloud storage auditing in time periods both earlier and later to the time period of the exposed key. It also provides support for batch auditing. Analysis shows that the proposed scheme is resistant to the replace attack of the Cloud Service Provider, preserves the data privacy against the Third Party Auditor, and can efficiently verify the correctness of data.


2017 ◽  
Vol 375 ◽  
pp. 48-53 ◽  
Author(s):  
Debiao He ◽  
Huaqun Wang ◽  
Jianhong Zhang ◽  
Lina Wang

2017 ◽  
Vol 18 (12) ◽  
pp. 1972-1977 ◽  
Author(s):  
Li-bing Wu ◽  
Jing Wang ◽  
De-biao He ◽  
Muhammad-Khurram Khan

2012 ◽  
Vol 3 (3) ◽  
pp. 60-61
Author(s):  
V.Sajeev V.Sajeev ◽  
◽  
R.Gowthamani R.Gowthamani

Author(s):  
Jiangang Shu ◽  
Xing Zou ◽  
Xiaohua Jia ◽  
Weizhe Zhang ◽  
Ruitao Xie

Sign in / Sign up

Export Citation Format

Share Document