1. An improved identity-based public audit protocol for cloud storage
- Author
-
Haoming Wang, Yuanhang Zhang, Xu An Wang, and Xiaoyuan Yang
- Subjects
Security ,Cloud computing ,Cloud storage ,Public integrity auditing ,Blockchain ,Science (General) ,Q1-390 ,Social sciences (General) ,H1-99 - Abstract
With the rapid development of informatization, a vast amount of data is continuously generated and accumulated, leading to the emergence of cloud storage services. However, data stored in the cloud is beyond the control of users, posing various security risks. Cloud data auditing technology enables the inspection of data integrity in the cloud without the necessity of data downloading. Among these, public auditing schemes have experienced rapid development due to their ability to avoid additional user auditing expenses. However, malicious third-party auditors can compromise data privacy. This paper proposes an improved identity-based cloud auditing scheme that can resist malicious auditors. This scheme is also constructed on an identity-based public auditing scheme using blockchain to prevent malicious auditing. We found the scheme is not secure because a malicious cloud server can forge authentication tags for outsourced data blocks, while our scheme has not these security flaws. Through security proofs and performance analysis, we further demonstrate that our scheme is secure and efficient. Additionally, our scheme has typical application scenarios.
- Published
- 2024
- Full Text
- View/download PDF