Technical gazette, Vol. 30 No. 2, 2023.
Original scientific paper
https://doi.org/10.17559/TV-20221216171505
Identity-Based Integrity Verification and Public Auditing Scheme in Cloud Storage System Against Malicious Auditors
Haojue Zhang
; School of International Economics and Management, Beijing Technology and Business University, Beijing 100048, China
Yilin Yuan
orcid.org/0000-0002-9021-5616
; School of Information Engineering, Beijing Institute of Graphic Communication, Beijing 102600, China
Xianwei Xin
; School of Computer and Information Engineering, Henan Normal University, Xinxiang, 453007, China
Yanbo Qu
; Intelligent Manufacturing Electronics R&D Center, Institute of Microelectronics of The Chinese Academy of Sciences, Chaoyang District, Beijing, 100029, China
Abstract
The cloud storage system provides users with convenient storage services. However, users who use cloud storage services lose absolute control over the data once they upload files to the cloud service provider (CSP). The integrity of the cloud data has become a problem worth considering. In the realization of verification of cloud storage schemes, a third-party auditor (TPA), as a professional organization that provides users with public audit services, is an indispensable and important entity. However, the TPA is not entirely credible because the TPA may perform audits dishonestly out of laziness or selfishness. Based on the above considerations, we provide a scheme for solving the problem of cloud data integrity verification and the TPA dishonesty based on identity-based encryption (IBE). The proposed identity-based public auditing verification scheme can provide security against malicious auditors. In this scheme, the mathematical design is based on IBE, which frees the users from complicated certificate management. In addition, during the public auditing phase, adding a timestamp can effectively prevent the malicious TPA from working dishonestly. Moreover, the security analysis and performance evaluation of the scheme for the untrusted CSP and semi-trusted TPA shows effective results.
Keywords
cloud storage; identity-based encryption; integrity verification; public auditing
Hrčak ID:
294337
URI
Publication date:
26.2.2023.
Visits: 1.013 *