A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds  

在线阅读下载全文

作  者:Meng Zhao Yong Ding Yujue Wang Huiyong Wang Bingyao Wang Lingang Liu 

机构地区:[1]School of Mechanical and Electrical Engineering, Guilin University of Electronic Technology, Guilin 541004, China [2]Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin 541004, China [3]School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin 541004, China

出  处:《国际计算机前沿大会会议论文集》2019年第1期342-345,共4页International Conference of Pioneering Computer Scientists, Engineers and Educators(ICPCSEE)

基  金:the National Natural Science Foundation of China under projects 61772150 and 61862012;the Guangxi Key R&D Program under project AB17195025;the Guangxi Natural Science Foundation under grants 2018GXNSFDA281054 and 2018GXNSFAA281232;the National Cryptography Development Fund of China under project MMJJ20170217;the Guangxi Young Teachers’ Basic Ability Improvement Program under Grant 2018KY0194;and the open program of Guangxi Key Laboratory of Cryptography and Information Security under projects GCIS201621 and GCIS201702.

摘  要:The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest status of outsourced data. Integrity auditing requires user to take massive time-consuming computations, which would not be affordable by weak devices. In this paper, we propose a privacy-preserving TPA-aided remote data integrity auditing scheme based on Li et al.’s data integrity auditing scheme without bilinear pairings, where a third party auditor (TPA) is employed to perform integrity auditing on outsourced data for users. The privacy of outsourced data can be guaranteed against TPA in the sense that TPA could not infer its contents from the returned proofs in the integrity auditing phase. Our construction is as efficient as Li et al.’s scheme, that is, each procedure takes the same time-consuming operations in both schemes, and our solution does not increase the sizes of processed data, challenge and proof.

关 键 词:Cloud STORAGE INTEGRITY AUDITING Provable Data POSSESSION PROOFS of STORAGE PROOFS of Retrievability 

分 类 号:C[社会学]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象