One secure data integrity verification scheme for cloud storage

Yongkai Fan, Xiaodong Lin, Gang Tan, Yuqing Zhang, Wei Dong, Jing Lei

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Cloud computing is a novel kind of information technology that users can enjoy sundry cloud services from the shared configurable computing resources. Compared with traditional local storage, cloud storage is a more economical choice because the remote data center can replace users for data management and maintenance, which can save time and money on the series of work. However, delivering data to an unknown Cloud Service Provider (CSP) makes the integrity of data become a potential vulnerability. To solve this problem, we propose a secure identity based aggregate signatures (SIBAS) as the data integrity checking scheme which resorts Trusted Execution Environment (TEE) as the auditor to check the outsourced data in the local side. SIBAS can not only check the integrity of outsourced data, but also achieve the secure key management in TEE through Shamir's (t,n) threshold scheme. To prove the security, security analysis in the random oracle model under the computational Diffie–Hellman assumption shows that SIBAS can resist attacks from the adversary that chooses its messages and target identities, experimental results also show that our solution is viable and efficient in practice.

Original languageEnglish (US)
Pages (from-to)376-385
Number of pages10
JournalFuture Generation Computer Systems
Volume96
DOIs
StatePublished - Jul 1 2019

Fingerprint

Cloud computing
Information management
Information technology

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

Fan, Yongkai ; Lin, Xiaodong ; Tan, Gang ; Zhang, Yuqing ; Dong, Wei ; Lei, Jing. / One secure data integrity verification scheme for cloud storage. In: Future Generation Computer Systems. 2019 ; Vol. 96. pp. 376-385.
@article{397bee2fdabf4567aa0e497613d4ec3b,
title = "One secure data integrity verification scheme for cloud storage",
abstract = "Cloud computing is a novel kind of information technology that users can enjoy sundry cloud services from the shared configurable computing resources. Compared with traditional local storage, cloud storage is a more economical choice because the remote data center can replace users for data management and maintenance, which can save time and money on the series of work. However, delivering data to an unknown Cloud Service Provider (CSP) makes the integrity of data become a potential vulnerability. To solve this problem, we propose a secure identity based aggregate signatures (SIBAS) as the data integrity checking scheme which resorts Trusted Execution Environment (TEE) as the auditor to check the outsourced data in the local side. SIBAS can not only check the integrity of outsourced data, but also achieve the secure key management in TEE through Shamir's (t,n) threshold scheme. To prove the security, security analysis in the random oracle model under the computational Diffie–Hellman assumption shows that SIBAS can resist attacks from the adversary that chooses its messages and target identities, experimental results also show that our solution is viable and efficient in practice.",
author = "Yongkai Fan and Xiaodong Lin and Gang Tan and Yuqing Zhang and Wei Dong and Jing Lei",
year = "2019",
month = "7",
day = "1",
doi = "10.1016/j.future.2019.01.054",
language = "English (US)",
volume = "96",
pages = "376--385",
journal = "Future Generation Computer Systems",
issn = "0167-739X",
publisher = "Elsevier",

}

One secure data integrity verification scheme for cloud storage. / Fan, Yongkai; Lin, Xiaodong; Tan, Gang; Zhang, Yuqing; Dong, Wei; Lei, Jing.

In: Future Generation Computer Systems, Vol. 96, 01.07.2019, p. 376-385.

Research output: Contribution to journalArticle

TY - JOUR

T1 - One secure data integrity verification scheme for cloud storage

AU - Fan, Yongkai

AU - Lin, Xiaodong

AU - Tan, Gang

AU - Zhang, Yuqing

AU - Dong, Wei

AU - Lei, Jing

PY - 2019/7/1

Y1 - 2019/7/1

N2 - Cloud computing is a novel kind of information technology that users can enjoy sundry cloud services from the shared configurable computing resources. Compared with traditional local storage, cloud storage is a more economical choice because the remote data center can replace users for data management and maintenance, which can save time and money on the series of work. However, delivering data to an unknown Cloud Service Provider (CSP) makes the integrity of data become a potential vulnerability. To solve this problem, we propose a secure identity based aggregate signatures (SIBAS) as the data integrity checking scheme which resorts Trusted Execution Environment (TEE) as the auditor to check the outsourced data in the local side. SIBAS can not only check the integrity of outsourced data, but also achieve the secure key management in TEE through Shamir's (t,n) threshold scheme. To prove the security, security analysis in the random oracle model under the computational Diffie–Hellman assumption shows that SIBAS can resist attacks from the adversary that chooses its messages and target identities, experimental results also show that our solution is viable and efficient in practice.

AB - Cloud computing is a novel kind of information technology that users can enjoy sundry cloud services from the shared configurable computing resources. Compared with traditional local storage, cloud storage is a more economical choice because the remote data center can replace users for data management and maintenance, which can save time and money on the series of work. However, delivering data to an unknown Cloud Service Provider (CSP) makes the integrity of data become a potential vulnerability. To solve this problem, we propose a secure identity based aggregate signatures (SIBAS) as the data integrity checking scheme which resorts Trusted Execution Environment (TEE) as the auditor to check the outsourced data in the local side. SIBAS can not only check the integrity of outsourced data, but also achieve the secure key management in TEE through Shamir's (t,n) threshold scheme. To prove the security, security analysis in the random oracle model under the computational Diffie–Hellman assumption shows that SIBAS can resist attacks from the adversary that chooses its messages and target identities, experimental results also show that our solution is viable and efficient in practice.

UR - http://www.scopus.com/inward/record.url?scp=85062089876&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85062089876&partnerID=8YFLogxK

U2 - 10.1016/j.future.2019.01.054

DO - 10.1016/j.future.2019.01.054

M3 - Article

AN - SCOPUS:85062089876

VL - 96

SP - 376

EP - 385

JO - Future Generation Computer Systems

JF - Future Generation Computer Systems

SN - 0167-739X

ER -