What are you looking for ?
Advertise with us
RAIDON

R&D: Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage

Proposed protocol is strictly proven to have properties of correctness, privacy, unforgeability and detectability, and give plenty of theoretical analysis and experimental results to validate efficiency of proposed protocol.

IEEE Transactions on Information Forensics and Security has published an article written by Yang Yang, School of Information and Security Engineering, Zhongnan University of Economics and Law, Wuhan, China, Yanjiao Chen, College of Electrical Engineering, Zhejiang University, Hangzhou, China, Fei Chen, College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China, and Jing Chen, Computer School, Wuhan University, Wuhan, China.

Abstract: Cloud storage is more and more prevalent in practice, and thus how to check its integrity becomes increasingly essential. A classical solution is identity-based (ID-based) provable data possession (PDP), which supports certificateless cloud storage auditing without entire user data. However, existing ID-PDP protocols always require that cloud users outsource data blocks, authenticators and a small-sized file tag to the cloud, and make use of the heavy elliptic curve cryptography over bilinear pairing. These disadvantages would result in vast storage, communication, and computation costs, which is unexpected, especially for resource-limited cloud users. To improve the performance, this paper proposes a novel cryptographic primitive: ID-based PDP with compressed cloud storage. In this model, cloud storage auditing can be achieved by using only encrypted data blocks in a self-verified way, and original data blocks can be reconstructed from the outsourced data. Thus, data owners no longer need to store original data blocks on the cloud. We also use some basic algebraic operations to realize a concrete ID-based PDP protocol with compressed cloud storage, which is quite efficient due to no heavy cryptographic operations involved. The proposed protocol can easily be extended to support the other practical functions by using the primitive replacement technique. The proposed protocol is strictly proven to have the properties of correctness, privacy, unforgeability and detectability. Finally, we give plenty of theoretical analysis and experimental results to validate the efficiency of the proposed protocol.

Articles_bottom
ExaGrid
AIC
ATTOtarget="_blank"
OPEN-E