Integrity checking protocol with identity-based proxy signature in mobile cloud computing

Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an ident...

Full description

Saved in:
Bibliographic Details
Main Authors: Li YAN, Run-hua SHI, Hong ZHONG, Jie CUI, Shun ZHANG, Yan XU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2015-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015232/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539556429529088
author Li YAN
Run-hua SHI
Hong ZHONG
Jie CUI
Shun ZHANG
Yan XU
author_facet Li YAN
Run-hua SHI
Hong ZHONG
Jie CUI
Shun ZHANG
Yan XU
author_sort Li YAN
collection DOAJ
description Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an identity-based proxy signature PDP(IBPS-PDP)protocol was presented.By using identity-based signatures,the system did not need to manage public key certificates and further the users did not need to take the additional computations to verify the other’s certificates yet.Finally,the security of the proposed IBPS-PDP protocol is proved in the random oracle model.
format Article
id doaj-art-12bade43e14b4d8c9953cb3ec76e7984
institution Kabale University
issn 1000-436X
language zho
publishDate 2015-10-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-12bade43e14b4d8c9953cb3ec76e79842025-01-14T06:54:02ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-10-013627828659696835Integrity checking protocol with identity-based proxy signature in mobile cloud computingLi YANRun-hua SHIHong ZHONGJie CUIShun ZHANGYan XUBased on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an identity-based proxy signature PDP(IBPS-PDP)protocol was presented.By using identity-based signatures,the system did not need to manage public key certificates and further the users did not need to take the additional computations to verify the other’s certificates yet.Finally,the security of the proposed IBPS-PDP protocol is proved in the random oracle model.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015232/mobile cloud computingdata integrityidentity-base signatureproxy signature
spellingShingle Li YAN
Run-hua SHI
Hong ZHONG
Jie CUI
Shun ZHANG
Yan XU
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Tongxin xuebao
mobile cloud computing
data integrity
identity-base signature
proxy signature
title Integrity checking protocol with identity-based proxy signature in mobile cloud computing
title_full Integrity checking protocol with identity-based proxy signature in mobile cloud computing
title_fullStr Integrity checking protocol with identity-based proxy signature in mobile cloud computing
title_full_unstemmed Integrity checking protocol with identity-based proxy signature in mobile cloud computing
title_short Integrity checking protocol with identity-based proxy signature in mobile cloud computing
title_sort integrity checking protocol with identity based proxy signature in mobile cloud computing
topic mobile cloud computing
data integrity
identity-base signature
proxy signature
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015232/
work_keys_str_mv AT liyan integritycheckingprotocolwithidentitybasedproxysignatureinmobilecloudcomputing
AT runhuashi integritycheckingprotocolwithidentitybasedproxysignatureinmobilecloudcomputing
AT hongzhong integritycheckingprotocolwithidentitybasedproxysignatureinmobilecloudcomputing
AT jiecui integritycheckingprotocolwithidentitybasedproxysignatureinmobilecloudcomputing
AT shunzhang integritycheckingprotocolwithidentitybasedproxysignatureinmobilecloudcomputing
AT yanxu integritycheckingprotocolwithidentitybasedproxysignatureinmobilecloudcomputing