Abstract
In recent years, many cloud data security auditing protocols have been proposed to protect the integrity of cloud data. In 2017, Wang et al. proposed an FSBA scheme on batch auditing. We found that this integrity verification algorithm does not enable public verification. In this paper, we improved this scheme for supporting public verification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ateniese, G., Burns, R., Curtmola, R.: Provable data possession at untrusted stores. In: Proceedings of the14thACM Conference on Computer and Communications Security (CCS2007), pp. 598–609. Alexandria, USA (2007)
Juels, A., Burton, S., Kaliski, J.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM, New York pp. 584–597 (2007)
Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319–333. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10366-7_19
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04444-1_22
Wang, H.-F., Li, Z.-H., Zhang, X., Sun. J., Zhao, X.-N.: Batch auditing supporting fast searching invalid files in cloud storage. Ji Suan Ji Xue Bao/Chin. J. Comput. 40(10), 2338–2351 (2017). https://doi.org/10.11897/SP.J.1016.2017. 02338
Li, T., Yang, A.J., Weng, J., Guo, Z.F.: Secure and efficient public auditing scheme for outsourced industrial internet data based on game contracts. Ruan Jian Xue Bao/J. Softw. (in Chinese). http://www.jos.org.cn/1000-9825/6716.htm
Han, J., Li, Y.P., Yu, Y., Ding, Y.: Cloud auditing scheme with dynamic revocation of users and real-time updates of data. Ruan Jian Xue Bao/J. Softw. 31(2), 578−596 (2020). (in Chinese). http://www.jos.org.cn/1000-9825/5633.htm
Shen, W.T., Yu, J., Yang, G.Y., Cheng, X.G., Hao, R.: Cloud storage integrity checking scheme with private key recovery capability. Ruan Jian Xue Bao/J. Softw. 27(6), 1451−1462 (2016). (in Chinese). http://www.jos.org.cn/1000-9825/4999
Kun, Q., Huang, H.-F.: A new identity-based public auditing against malicious auditor in the cloud. Int. J. Embed. Syst. 11, 452–460 (2019)
Acknowledgements
This work is supported by Natural Science Foundation of Shanxi Province (No. 2023-JC-YB-584), the Key Research and Development Program of Xianyang City (No. L2022ZDYFSF061), and Scientific Research Funding of Xianyang Vocational & Technical College on “Research on Key Technologies for Secure Outsourced Cloud Storage” (Grant No. 2021KJB03). This work is also supported by basic cutting-edge innovation projects of engineering university of PAP(WJY202313).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zhou, M., Wang, X.A., Zhang, X., Xu, X., Zhang, J., Li, P. (2023). An Improved Data Integrity Verification Scheme for Cloud Storage. In: Barolli, L. (eds) Advances in Intelligent Networking and Collaborative Systems. INCoS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 182. Springer, Cham. https://doi.org/10.1007/978-3-031-40971-4_37
Download citation
DOI: https://doi.org/10.1007/978-3-031-40971-4_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-40970-7
Online ISBN: 978-3-031-40971-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)