Skip to main content
Log in

An efficient \(\mathcal{iO}\)-based data integrity verification scheme for cloud storage

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Li H W, Liu D X, Dai Y S, et al. Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Top Comput, 2015, 3: 127–138

    Article  Google Scholar 

  2. Zhang Y, Xu C X, Yu S, et al. SCLPV: secure certificateless public verification for cloud-based cyberphysical-social systems against malicious auditors. IEEE Trans Comput Soc Syst, 2015, 2: 159–170

    Article  Google Scholar 

  3. Li H W, Yang Y, Dai Y S, et al. Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput, 2017. doi: 10.1109/TCC.2017.2769645

    Google Scholar 

  4. Sun L X, Xu C X, Zhang Y. A dynamic and noninteractive boolean searchable symmetric encryption in multi-client setting. J Inf Secur Appl, 2018, 40: 145–155

    Google Scholar 

  5. Garg S, Gentry C, Halevi S, et al. Candidate indistinguishability obfuscation and functional encryption for all circuits. In: Proceedings of the 54th Annual Symposium on Foundations of Computer Science, Berkeley, 2013. 40–49

    Google Scholar 

  6. Zhang Y, Xu C X, Liang X H, et al. Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans Inf Forensic Secur, 2017, 12: 676–688

    Article  Google Scholar 

  7. Sun L X, Xu C X, Zhang MW, et al. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci China Inf Sci, 2018, 61: 038106

    Article  Google Scholar 

  8. Guan C W, Ren K, Zhang F G, et al. Symmetrickey based proofs of retrievability supporting public verification. In: Proceedings of European Symposium on Research in Computer Security, Vienna, 2015. 203–223

    Google Scholar 

  9. Shi E, Stefanov E, Papamanthou C. Practical dynamic proofs of retrievability. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Berlin, 2013. 325–336

    Google Scholar 

Download references

Acknowledgement

This work was supported by National Key R&D Program of China (Grant No. 2017YFB0802000) and National Natural Science Foundation of China (Grant No. 61370203).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Lixue Sun or Chunxiang Xu.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, L., Xu, C., Zhang, Y. et al. An efficient \(\mathcal{iO}\)-based data integrity verification scheme for cloud storage. Sci. China Inf. Sci. 62, 59101 (2019). https://doi.org/10.1007/s11432-018-9500-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-018-9500-0

Navigation