dc.contributor.author | Yu, Y | |
dc.contributor.author | Au, MH | |
dc.contributor.author | Ateniese, G | |
dc.contributor.author | Huang, X | |
dc.contributor.author | Susilo, W | |
dc.contributor.author | Dai, Y | |
dc.contributor.author | Min, G | |
dc.date.accessioned | 2017-02-14T10:57:05Z | |
dc.date.issued | 2017-04 | |
dc.description.abstract | Remote data integrity checking (RDIC) enables a
data storage server, such as a cloud server, to prove to a
verifier that it is actually storing a data owner’s data honestly.
To date, a number of RDIC protocols have been proposed in
the literature, but almost all the constructions suffer from the
issue of a complex key management, that is, they rely on the
expensive public key infrastructure (PKI), which might hinder
the deployment of RDIC in practice. In this paper, we propose
a new construction of identity-based (ID-based) RDIC protocol
by making use of key-homomorphic cryptographic primitive
to reduce the system complexity and the cost for establishing
and managing the public key authentication framework in PKI
based RDIC schemes. We formalize ID-based RDIC and its
security model including security against a malicious cloud server
and zero knowledge privacy against a third party verifier. We
then provide a concrete construction of ID-based RDIC scheme
which leaks no information of the stored files to the verifier
during the RDIC process. The new construction is proven secure
against the malicious server in the generic group model and
achieves zero knowledge privacy against a verifier. Extensive
security analysis and implementation results demonstrate that
the proposed new protocol is provably secure and practical in
the real-world applications. | en_GB |
dc.description.sponsorship | This work is supported by
the National Natural Science Foundation of China
(61501333,61300213,61272436,61472083), Fok Ying Tung
Education Foundation (141065), Program for New Century
Excellent Talents in Fujian University (JA14067 | en_GB |
dc.identifier.citation | Vol. 12, pp. 767 - 778 | en_GB |
dc.identifier.doi | 10.1109/TIFS.2016.2615853 | |
dc.identifier.uri | http://hdl.handle.net/10871/25833 | |
dc.language.iso | en | en_GB |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_GB |
dc.rights | (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. | en_GB |
dc.subject | Cloud storage | en_GB |
dc.subject | data integrity | en_GB |
dc.subject | privacy preserving | en_GB |
dc.subject | identity-based cryptography | en_GB |
dc.title | Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage | en_GB |
dc.type | Article | en_GB |
dc.date.available | 2017-02-14T10:57:05Z | |
dc.identifier.issn | 1556-6013 | |
dc.description | This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record. | en_GB |
dc.identifier.journal | IEEE Transactions on Information Forensics and Security | en_GB |