کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
425541 685775 2016 7 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Cloud data integrity checking with an identity-based auditing mechanism from RSA
ترجمه فارسی عنوان
ابر تمامیت داده ها چک کردن با یک مکانیزم حسابرسی مبتنی بر هویت از RSA
کلمات کلیدی
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
چکیده انگلیسی


• We formalize the security requirement for identity-based cloud data integrity auditing mechanism.
• We provide a concrete construction of identity-based cloud data integrity checking protocol.
• We prove that our construction is secure under the well-known RSA assumption.

Cloud data auditing is extremely essential for securing cloud storage since it enables cloud users to verify the integrity of their outsourced data efficiently. The computation overheads on both the cloud server and the verifier can be significantly reduced by making use of data auditing because there is no necessity to retrieve the entire file but rather just use a spot checking technique. A number of cloud data auditing schemes have been proposed recently, but a majority of the proposals are based on Public Key Infrastructure (PKI). There are some drawbacks in these protocols: (1) It is mandatory to verify the validity of public key certificates before using any public key, which makes the verifier incur expensive computation cost. (2) Complex certificate management makes the whole protocol inefficient. To address the key management issues in cloud data auditing, in this paper, we propose ID-CDIC, an identity-based cloud data integrity checking protocol which can eliminate the complex certificate management in traditional cloud data integrity checking protocols. The proposed concrete construction from RSA signature can support variable-sized file blocks and public auditing. In addition, we provide a formal security model for ID-CDIC and prove the security of our construction under the RSA assumption with large public exponents in the random oracle model. We demonstrate the performance of our proposal by developing a prototype of the protocol. Implementation results show that the proposed ID-CDIC protocol is very practical and adoptable in real life.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Future Generation Computer Systems - Volume 62, September 2016, Pages 85–91
نویسندگان
, , , , , , , ,