Abstract
With the rapid development of cloud storage, cloud users are willing to store data in the cloud storage system, and at the same time, the requirements for the security, integrity, and availability of data storage are getting higher and higher. Although many cloud audit schemes have been proposed, the data storage overhead is too large and the data cannot be dynamically updated efficiently when most of the schemes are in use. In order to solve these problems, a cloud audit scheme for multi-copy dynamic data integrity based on red-black tree full nodes is proposed. This scheme uses ID-based key authentication, and improves the classic Merkel hash tree MHT to achieve multi-copy storage and dynamic data manipulation, which improves the efficiency of real-time dynamic data update (insertion, deletion, modification). The third-party audit organization replaces users to verify the integrity of data stored on remote cloud servers, which reduces the computing overhead and system communication overhead. The security analysis proves that the security model based on the CDH problem and the DL problem is safe. Judging from the results of the simulation experiment, the scheme is safe and efficient.
Highlights
In the face of increasing user management and sharing needs, the emergence of cloud computing and cloud storage provides a new scheme for it
When people use cloud storage services, they upload their data to the cloud and store it on a remote cloud server
One is the lack of control over the confidentiality and integrity of the data and the other is that it is difficult to recover the data if the local copy is deleted [4]–[6]
Summary
In the face of increasing user management and sharing needs, the emergence of cloud computing and cloud storage provides a new scheme for it. In order to realize the public audit of multi-copy storage, Curtmola et al [25] proposed an audit scheme based on RSA signatures, but it cannot support analyzing dynamic data. SYSTEM COMPOSITION A multi-copy dynamic data integrity audit protocol includes the following algorithms: 1) KeyGen: This algorithm is executed by the user It accepts a security parameter x as input, and generates a key pair (sk, pk) and system parameters, which will be used in the following algorithm. D. DESIGN GOAL In order to achieve safe and effective dynamic audit of cloud data, our schema design should achieve the following goals: 1) Public audit: TPA can verify the integrity of the data stored in the cloud server on behalf of the user, and will not cause other problems to the user. The integrity of the block can be known based on the comparison of the node value, which greatly reduces the waste of resources
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.