期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Sec-Auditor:A Blockchain-Based Data Auditing Solution for Ensuring Integrity and Semantic Correctness
1
作者 Guodong Han Hecheng Li 《Computers, Materials & Continua》 SCIE EI 2024年第8期2121-2137,共17页
Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when ... Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when users perform file operations,the semantic integrity of the data can be compromised.Ensuring both data integrity and semantic correctness has become a critical issue that requires attention.We introduce a pioneering solution called Sec-Auditor,the first of its kind with the ability to verify data integrity and semantic correctness simultaneously,while maintaining a constant communication cost independent of the audited data volume.Sec-Auditor also supports public auditing,enabling anyone with access to public information to conduct data audits.This feature makes Sec-Auditor highly adaptable to open data environments,such as the cloud.In Sec-Auditor,users are assigned specific rules that are utilized to verify the accuracy of data semantic.Furthermore,users are given the flexibility to update their own rules as needed.We conduct in-depth analyses of the correctness and security of Sec-Auditor.We also compare several important security attributes with existing schemes,demonstrating the superior properties of Sec-Auditor.Evaluation results demonstrate that even for time-consuming file upload operations,our solution is more efficient than the comparison one. 展开更多
关键词 Provable data possession public auditing cloud storage data integrity semantic correctness
下载PDF
An Efficient Method for Checking the Integrity of Data in the Cloud 被引量:2
2
作者 TAN Shuang TAN Lin +1 位作者 LI Xiaoling JIA Yan 《China Communications》 SCIE CSCD 2014年第9期68-81,共14页
Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new ch... Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure. 展开更多
关键词 cloud computing storage security public auditability provable data integrity
下载PDF
Cryptanalysis of an identity-based public auditing protocol for cloud storage 被引量:4
3
作者 Li-bing WU Jing WANG +1 位作者 De-biao HE Muhammad-Khurram KHAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第12期1972-1977,共6页
Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cloud ... Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cloud data to simplify key management and alleviate the burden of check tasks. They claimed that NaEPASC enables a third- party auditor (TPA) to verify the integrity of outsourced data with high efficiency and security in a cloud computing environment. However, in this paper, we pinpoint that NaEPASC is vulnerable to the signature forgery attack in the setup phase; i.e., a malicious cloud server can forge a valid signature for an arbitrary data block by using two correct signatures. Moreover, we demonstrate that NaEPASC is subject to data privacy threats in the challenge phase; i.e., an external attacker acting as a TPA can reveal the content of outsourced data. The analysis shows that NaEPASC is not secure in the data verification process. Therefore, our work is helpful for cryptographers and engineers to design and implement more secure and efficient identitv-based nublic alldit^n~ .~cheme~ far clnne] ~tnr^q~ 展开更多
关键词 Cloud data public auditing Data integrity Data privacy
原文传递
Improved Fair and Dynamic Provable Data Possession Supporting Public Verification 被引量:2
4
作者 REN Zhengwei WANG Lina +1 位作者 DENG Ruyi YU Rongwei 《Wuhan University Journal of Natural Sciences》 CAS 2013年第4期348-354,共7页
A number of proposals have been suggested to tackle data integrity and privacy concerns in cloud storage in which some existing schemes suffer from vulnerabilities in data dynamics. In this paper, we propose an improv... A number of proposals have been suggested to tackle data integrity and privacy concerns in cloud storage in which some existing schemes suffer from vulnerabilities in data dynamics. In this paper, we propose an improved fairness and dynamic provable data possession scheme that supports public verification and batch auditing while preserves data privacy. The rb23Tree is utilized to facilitate data dynamics. Moreover, the fairness is considered to prevent a dishonest user from accusing the cloud service provider of manipulating the data. The scheme allows a third party auditor (TPA) to verify the data integrity without learning any information about the data content during the auditing process. Furthermore, our scheme also allows batch auditing, which greatly accelerates the auditing process when there are multiple auditing requests. Security analysis and extensive experimental evaluations show that our scheme is secure and efficient. 展开更多
关键词 cloud storage data integrity public audit data dynamics privacy protection
原文传递
Public Auditing for Encrypted Data with Client-Side Deduplication in Cloud Storage 被引量:4
5
作者 HE Kai HUANG Chuanhe +3 位作者 ZHOU Hao SHI Jiaoli WANG Xiaomao DAN Feng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第4期291-298,共8页
Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects... Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects together. However, these schemes either only support plaintext data file or have been proved insecure. In this paper, we propose a public auditing scheme for cloud storage systems, in which deduplication of encrypted data and data integrity checking can be achieved within the same framework. The cloud server can correctly check the ownership for new owners and the auditor can correctly check the integrity of deduplicated data. Our scheme supports deduplication of encrypted data by using the method of proxy re-encryption and also achieves deduplication of data tags by aggregating the tags from different owners. The analysis and experiment results show that our scheme is provably secure and efficient. 展开更多
关键词 public auditing data integrity storage deduplication cloud storage
原文传递
Public auditing for real‑time medical sensor data in cloud‑assisted HealthIIoT system
6
作者 Weiping Ye Jia Wang +1 位作者 Hui Tian Hanyu Quan 《Frontiers of Optoelectronics》 EI CSCD 2022年第3期1-14,共14页
With the advancement of industrial internet of things(IIoT),wireless medical sensor networks(WMSNs)have been widely introduced in modern healthcare systems to collect real-time medical data from patients,which is know... With the advancement of industrial internet of things(IIoT),wireless medical sensor networks(WMSNs)have been widely introduced in modern healthcare systems to collect real-time medical data from patients,which is known as HealthIIoT.Considering the limited computing and storage capabilities of lightweight HealthIIoT devices,it is necessary to upload these data to remote cloud servers for storage and maintenance.However,there are still some serious security issues within outsourcing medical sensor data to the cloud.One of the most signifcant challenges is how to ensure the integrity of these data,which is a prerequisite for providing precise medical diagnosis and treatment.To meet this challenge,we propose a novel and efcient public auditing scheme,which is suitable for cloud-assisted HealthIIoT system.Specifcally,to address the contradiction between the high real-time requirement of medical sensor data and the limited computing power of HealthIIoT devices,a new online/ofine tag generation algorithm is designed to improve preprocessing efciency;to protect medical data privacy,a secure hash function is employed to blind the data proof.We formally prove the security of the presented scheme,and evaluate the performance through detailed experimental comparisons with the state-of-the-art ones.The results show that the presented scheme can greatly improve the efciency of tag generation,while achieving better auditing performance than previous schemes. 展开更多
关键词 Healthcare industrial internet of things(HealthIIoT) Medical sensor data Online/ofine signature public auditing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部