scholarly journals Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

2019 ◽  
Vol 16 (1) ◽  
pp. 72-83 ◽  
Author(s):  
Yannan Li ◽  
Yong Yu ◽  
Geyong Min ◽  
Willy Susilo ◽  
Jianbing Ni ◽  
...  
2016 ◽  
Vol 3 (5) ◽  
pp. 44-52 ◽  
Author(s):  
Yuan Zhang ◽  
Chunxiang Xu ◽  
Hongwei Li ◽  
Xiaohui Liang

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 160459-160471 ◽  
Author(s):  
Chenbin Zhao ◽  
Li Xu ◽  
Jiguo Li ◽  
Feng Wang ◽  
He Fang

Information honesty, a center security issue in solid distributed storage, has gotten a lot of consideration. Information inspecting conventions empower a verifier to productively check the trustworthiness of the re-appropriated information without downloading the information. A key exploration challenge related with existing plans of information reviewing conventions is the intricacy in key administration. In this paper, we look to address the unpredictable key administration challenge in cloud information uprightness checking by presenting fluffy personality based examining, the first in such a methodology, as far as we could possibly know. All the more explicitly, we present the crude of fluffy character based information examining, where a client's personality can be seen as a lot of spellbinding qualities. We formalize the framework model and the security model for this new crude. We at that point present a solid development of fluffy personality based inspecting convention by using biometrics as the fluffy character. The new convention offers the property of mistake resistance, in particular, it ties with private key to one personality which can be utilized to confirm the rightness of a reaction created with another character, if and just if the two characters are adequately close. We demonstrate the security of our convention dependent on the computational Diffie-Hellman suspicion and the discrete logarithm supposition in the particular ID security model. At long last, we build up a model usage of the convention which shows the common sense of the proposition.


2019 ◽  
Vol 2019 ◽  
pp. 1-15 ◽  
Author(s):  
Wenting Shen ◽  
Jing Qin ◽  
Jixin Ma

Cloud storage auditing allows the users to store their data to the cloud with a guarantee that the data integrity can be efficiently checked. In order to release the user from the burden of generating data signatures, the proxy with a valid warrant is introduced to help the user process data in lightweight cloud storage auditing schemes. However, the proxy might be revoked or the proxy’s warrant might expire. These problems are common and essential in real-world applications, but they are not considered and solved in existing lightweight cloud storage auditing schemes. In this paper, we propose a lightweight identity-based cloud storage auditing scheme supporting proxy update, which not only reduces the user’s computation overhead but also makes the revoked proxy or the expired proxy unable to process data on behalf of the user any more. The signatures generated by the revoked proxy or the expired proxy can still be used to verify data integrity. Furthermore, our scheme also supports workload-based payment for the proxy. The security proof and the performance analysis indicate that our scheme is secure and efficient.


Sign in / Sign up

Export Citation Format

Share Document