Abstract
How to verify the integrity of outsourced data is an important problem in cloud storage. Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor. In this paper, we propose an identity-based data storage and integrity verification protocol on untrusted cloud. And the proposed protocol can guarantee fair results without any third verifying auditor. The theoretical analysis and simulation results show that our protocols are secure and efficient.
Highlights
With the growing popularity of clouds, the tools and technologies for hybrid clouds have been emerging recently; cloud storage has become a hot research topic that aims to provide a comparably low cost, scalable, positionindependent platform for data owners data [1]
When considering using the complex cloud service, the data owner must be aware of the fact that all data given to the cloud server leave the owner control protection sphere [4]
It is a strong demand that the data owners can check the data integrity confidentially, dynamically, and publicly; besides, the anonymous is demanded for smart phone users
Summary
With the growing popularity of clouds, the tools and technologies for hybrid clouds have been emerging recently; cloud storage has become a hot research topic that aims to provide a comparably low cost, scalable, positionindependent platform for data owners data [1]. To guarantee fair results, neither the cloud service provider nor the data owner should be the auditor in a cloud storage system In this case, the protocols [13,14,15] employed the third party audit (TPA) performing the verification. Without requiring any trusted organizer during the batch auditing for multiple clouds the client may delegate the remote data integrity checking task to the third party.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have