Public Data Integrity Verification Scheme for Secure Cloud Storage

Although cloud storage provides convenient data outsourcing services, an untrusted cloud server frequently threatens the integrity and security of the outsourced data. Therefore, it is extremely urgent to design security schemes allowing the users to check the integrity of data with acceptable compu...

Täydet tiedot

Bibliografiset tiedot
Päätekijät: Yuan Ping, Yu Zhan, Ke Lu, Baocang Wang
Aineistotyyppi: Artikkeli
Kieli:English
Julkaistu: MDPI AG 2020-08-01
Sarja:Information
Aiheet:
Linkit:https://www.mdpi.com/2078-2489/11/9/409
Kuvaus
Yhteenveto:Although cloud storage provides convenient data outsourcing services, an untrusted cloud server frequently threatens the integrity and security of the outsourced data. Therefore, it is extremely urgent to design security schemes allowing the users to check the integrity of data with acceptable computational and communication overheads. In this paper, we first propose a public data integrity verification scheme based on the algebraic signature and elliptic curve cryptography. This scheme not only allows the third party authority deputize for users to verify the outsourced data integrity, but also resists malicious attacks such as replay attacks, replacing attack and forgery attacks. Data privacy is guaranteed by symmetric encryption. Furthermore, we construct a novel data structure named divide and conquer hash list, which can efficiently perform data updating operations, such as deletion, insertion, and modification. Compared with the relevant schemes in the literature, security analysis and performance evaluations show that the proposed scheme gains some advantages in integrity verification and dynamic updating.
ISSN:2078-2489