Skip to main content
Log in

ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security

  • Computer Science
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Cloud storage service reduces the burden of data users by storing users’ data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores [C] // Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS07). New York: ACM, 2007: 598–609.

    Google Scholar 

  2. Ateniese G, Kamara S, Katz J. Proofs of storage from homomorphic identification protocols [C]// Proceedings of the 15th International Conference on Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin, Heidelberg: Springer-Verlag, 2009: 319–333.

    Google Scholar 

  3. Lu R, Lin X, Luan T, et al. Pseudonym changing at social spots: An effective strategy for location privacy in VANETs [J]. IEEE Transaction on Vehicular Technology, 2012, 61(1): 86–96.

    Article  Google Scholar 

  4. Kaaniche N, Boudguiga A, Laurent M. ID-based cryptography for secure cloud data storage [C]// Proceedings of the IEEE Sixth International Conference on Cloud Computing. Washington D C: IEEE Computer Society, 2013: 375–382.

    Google Scholar 

  5. Wang Q, Wang C, Ren K, et al. Enabling public auditability and data dynamics for storage security in cloud computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5): 847–859.

    Article  CAS  Google Scholar 

  6. Wang C, Wang Q, Ren K, et al. Privacy-preserving public auditing for data storage security in cloud computing [C]// Proceedings of the IEEE INFO-COM. Washington D C: IEEE Computer Society, 2010: 525–533.

    Google Scholar 

  7. Yuan J, Yu S. Public integrity auditing for dynamic data sharing with multiuser modification [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(8): 1717–1726.

    Article  Google Scholar 

  8. Zhang J, Zhao X. Privacy-preserving public auditing scheme for shared data with supporting multi-function [J]. Journal of Communications, 2015, 10(7): 535–542.

    Google Scholar 

  9. Zeng K. Publicly verifiable remote data integrity [C]// Proceedings of the 10th International Conference on Information and Communications Security. New York: ACM, 2008: 419–434.

    Chapter  Google Scholar 

  10. Zhu Y, Hu H, Ahn G, et al. Cooperative provable data possession for integrity verification in multi-cloud storage [J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(12): 2231–2244.

    Article  Google Scholar 

  11. Zhu Y, Wang H, Hu Z, et al. Dynamic audit services for integrity verification of outsourced storages in clouds [C]// Proceedings of the ACM Symposium on Applied Computing. New York: ACM, 2011: 1550–1557.

    Google Scholar 

  12. Worku S, Xu C, Zhao J, et al. Secure and efficient privacy- preserving public auditing scheme [J]. Computer and Electrical Engineering, 2014, 40(5): 1703–1713.

    Article  Google Scholar 

  13. Li Y, Yu Y, Yang B, et al. Privacy preserving cloud auditing with efficient key update [J]. Future Generation Computer Systems, 2018, 78(2): 789–798.

    Article  CAS  Google Scholar 

  14. Xue L, Ni J, Li Y, et al. Provable data transfer from provable data possession and deletion in cloud storage [J]. Computer Standard amp; Interfaces, 2017, 54(1): 46–54.

    Article  Google Scholar 

  15. Jin H, Zhou K, Jiang H, et al. Full integrity and freshness for cloud data [J]. Future Generation Computer Systems, 2018, 80(3): 640–652.

    Article  Google Scholar 

  16. Kang B, Xu D. Secure electronic cash scheme with anonymity revocation [J]. Mobile Information Systems. 2016, Article ID 2620141, DOI: http://dx.doi.org/10.1155/2016/2620141.

    Google Scholar 

  17. Wang H, Wu Q, Qin B, et al. Identity-based remote data possession checking in public clouds [J]. IET Information Security, 2014, 8(2): 114–121.

    Article  CAS  Google Scholar 

  18. Zhang J, Dong Q. Efficient ID-based public auditing for the outsourced data in cloud storage [J]. Information Sciences, 2016, 343(C):1–14.

    Google Scholar 

  19. Yu Y, Xue L, Aub M, et al. Cloud data integrity checking with an identity-based auditing mechanism from RSA [J]. Future Generation Computer Systems, 2016, 62(9): 85–91.

    Article  Google Scholar 

  20. Wei L, Zhu H, Cao Z, et al. Security and privacy for storage and computation in cloud computing [J]. Information Sciences, 2014, 258(2): 371–386.

    Article  Google Scholar 

  21. He D, Wang H, Zhang J, et al. Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage [J]. Information Sciences, 2017, 375(1) 48–53.

    Article  Google Scholar 

  22. Hou H, Yu J, Hao R. Research on an integrity auditing scheme based on algebraic signature in cloud storage [J]. Netinfo Security, 2017, 17(10): 69–74.

    Google Scholar 

  23. Yang T, Yu B, Wang H, et al. Cryptanalysis and improvement of Panda-public auditing for shared data in cloud and internet of things [J]. Multimedia Tools and Applications, 2017, 76(19): 19411–19428.

    Article  Google Scholar 

  24. Kang B, Wang J, Shao D. Certificateless public auditing with privacy preserving for cloud-assisted wireless body area networks [J]. Mobile Information Systems, 2017, Article ID 2925465, DOI: https://doi.org/10.1155/2017/ 2925465.

    Google Scholar 

  25. Bian G, Shao B, Cai W, et al. Research on multiple-replica integrity auditing method on supporting data dynamic updating in cloud environment [J]. Netinfo Security, 2017, 17(10): 22–28.

    Google Scholar 

  26. Kim D, Jeong I. Provably-secure public auditing with deduplication [J]. KSII Transactions on Internet and Information systems, 2017, 11(4): 2219–2236.

    Google Scholar 

  27. Shen W, Yu J, Yang G, et al. Access-authorizing and privacy- preserving auditing with group dynamic for shared cloud data [J]. KSII Transactions on Internet and Information Systems, 2017, 10(7): 3319–3338.

    Google Scholar 

  28. Zhang J, Li P. An efficient data integrity verification scheme for cloud storage [J]. Netinfo Security, 2017, 17(3): 1–5.

    CAS  Google Scholar 

  29. Yu H, Cai Y, Kong S, et al. Efficient and secure identity-based public auditing for dynamic outsourced data with proxy [J]. KSII Transactions on Internet and Information Systems, 2017, 11(10): 5039–5061.

    Google Scholar 

  30. Kim D, Kwon H, Hahn C, et al. Privacy-preserving public auditing for educational multimedia data in cloud computing [J]. Multimedia Tools and Applications, 2016, 75(21): 13077–13091.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Jiang.

Additional information

Foundation item: Supported by the Applied Basic and Advanced Technology Research Programs of Tianjin (15JCYBJC15900) and the National Natural Science Foundation of China ( 51378350)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jiang, H., Xie, M., Kang, B. et al. ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security. Wuhan Univ. J. Nat. Sci. 23, 362–368 (2018). https://doi.org/10.1007/s11859-018-1335-9

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-018-1335-9

Key words

CLC number

Navigation