Abstract

How to verify the integrity of outsourced data is an important problem in cloud storage. Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor. In this paper, we propose an identity-based data storage and integrity verification protocol on untrusted cloud. And the proposed protocol can guarantee fair results without any third verifying auditor. The theoretical analysis and simulation results show that our protocols are secure and efficient.

Highlights

  • With the growing popularity of clouds, the tools and technologies for hybrid clouds have been emerging recently; cloud storage has become a hot research topic that aims to provide a comparably low cost, scalable, positionindependent platform for data owners data [1]

  • When considering using the complex cloud service, the data owner must be aware of the fact that all data given to the cloud server leave the owner control protection sphere [4]

  • It is a strong demand that the data owners can check the data integrity confidentially, dynamically, and publicly; besides, the anonymous is demanded for smart phone users

Read more

Summary

Introduction

With the growing popularity of clouds, the tools and technologies for hybrid clouds have been emerging recently; cloud storage has become a hot research topic that aims to provide a comparably low cost, scalable, positionindependent platform for data owners data [1]. To guarantee fair results, neither the cloud service provider nor the data owner should be the auditor in a cloud storage system In this case, the protocols [13,14,15] employed the third party audit (TPA) performing the verification. Without requiring any trusted organizer during the batch auditing for multiple clouds the client may delegate the remote data integrity checking task to the third party.

Definitions and Preliminiaries
The Proposed Schemes
Storage Correctness Guarantee
Privacy-Preserving Guarantee
Forward Secerecy
Performance Comparison and Functionality Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call