Abstract

Cloud storage has attracted more and more concern since it permits cloud users to save and employ the corresponding outsourced files at arbitrary time, with arbitrary facility and from arbitrary place. To make sure data integrality, numerous public auditing constructions have been presented. However, existing constructions mainly have built on the PKI. In these constructions, to achieve data integrality, the auditor first must authenticate the legality of PKC, which leads to a great burden for the auditor. To eliminate the verification of time-consuming certificate, in this work, we present an efficient identity-based public auditing proposal. Our construction is an identity-based data auditing system in the true sense in that the algorithm to calculate authentication signature is an identity-based signature algorithm. By extensive security evaluation and experimental testing, the consequences demonstrate that our proposal is safe and effective; it can efficiently hold back forgery attack and replay attack. Finally, compared with the two identity-based public auditing proposals, our proposal outperforms the two proposals under the condition of overall considering computational cost, communication overhead, and security strength.

Highlights

  • With the technique progress in communication filed, the amount of the generated data is going through fast growth

  • Many companies working on the healthcare trade increasingly make use of cloud storage services

  • Numerous specialists deem that cloudcomputing technique may make healthcare services good by reducing EHC start-up costs, such as software, equipment, employee, and various license fees. ese reasons will urge to adopt the relevant cloud techniques

Read more

Summary

Introduction

With the technique progress in communication filed, the amount of the generated data is going through fast growth. Let us see one instance of healthcare services in which cloud technique is applied, the Healthcare Sensor system can automatically collect the patients’ vital data of the wearable devices which are connected to traditional medical equipment via wireless sensor networks and upload these data to “medical cloud” for storage. Another typical instance is the Sphere of Care by Aossia Healthcare, it is started in 2015. In the auditing phase, the auditor firstly verifies the validity of an identity-based signature on a public key PK, and it executes data integrity verificationby using this public key PK again, which increases the computation burden of the auditor. (3) In the random oracle model, the proposed proposal has serious security proof, and the corresponding proof can be tightly reduced to the CDH mathematic problem

Architecture and Security of System
Our Public Auditing Construction
Challenge phase 8 Prove phase
Security Analysis
Performance Evaluation
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call