Integrity checking protocol with identity-based proxy signature in mobile cloud computing

Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an ident...

Full description

Saved in:
Bibliographic Details
Main Authors: Li YAN, Run-hua SHI, Hong ZHONG, Jie CUI, Shun ZHANG, Yan XU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2015-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015232/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an identity-based proxy signature PDP(IBPS-PDP)protocol was presented.By using identity-based signatures,the system did not need to manage public key certificates and further the users did not need to take the additional computations to verify the other’s certificates yet.Finally,the security of the proposed IBPS-PDP protocol is proved in the random oracle model.
ISSN:1000-436X