计算机科学
随机预言
云计算
方案(数学)
云存储
计算机安全
可证明的安全性
数学证明
审计
计算机安全模型
信息隐私
加密
公钥密码术
会计
数学
数学分析
几何学
业务
操作系统
作者
Lunzhi Deng,Shuai Feng,Tao Wang,Zhenyu Hu,Siwei Li
出处
期刊:IEEE Transactions on Dependable and Secure Computing
[Institute of Electrical and Electronics Engineers]
日期:2023-11-27
卷期号:: 1-12
标识
DOI:10.1109/tdsc.2023.3336994
摘要
In a data auditing scheme, the data owner authorizes a third-party auditor (TPA) to check whether the data stored in the cloud remains intact. Researchers have given many data auditing schemes. However, there are still three significant shortcomings in these schemes. First of all, the security proofs of these schemes are completed in the random oracle model (ROM). As we all know, a scheme with provably security in ROM may be insecure in practical applications. Secondly, TPA in most known schemes is set to be completely reliable. However, TPA in reality may attempt to extract the data owner's data. These schemes cannot resist the malicious behavior of TPA. Third, most known schemes require hash-to-point operations and enjoy high computation cost, so they are not suitable for computing constrained environments. In this paper, we first presented the system model and security demands for an identity-based data auditing (IBDA) scheme. We then came up with a new IBDA scheme and showed the security proofs in the standard model (SM).Finally, we made an analysis on performance for seven data auditing schemes. In our scheme, the computation cost required by TPA is a constant, independent of the number of data blocks participating in the challenge. Therefore, our scheme requires low computation cost and is suitable for computing-constrained environments
科研通智能强力驱动
Strongly Powered by AbleSci AI