Identity-based anonymous cloud auditing scheme with compact tags

Cloud storage has the advantages of high efficiency and scalability.Users can save local storage cost and share data with others through cloud storage technology.However, when data is uploaded to cloud servers, its owner also loses the physical control, and hence there needs a corresponding mechanis...

Full description

Saved in:
Bibliographic Details
Main Authors: Chenxin LU, Bing CHEN, Ning DING, Liquan CHEN, Ge WU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022087
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529688581734400
author Chenxin LU
Bing CHEN
Ning DING
Liquan CHEN
Ge WU
author_facet Chenxin LU
Bing CHEN
Ning DING
Liquan CHEN
Ge WU
author_sort Chenxin LU
collection DOAJ
description Cloud storage has the advantages of high efficiency and scalability.Users can save local storage cost and share data with others through cloud storage technology.However, when data is uploaded to cloud servers, its owner also loses the physical control, and hence there needs a corresponding mechanism to ensure the integrity of data stored in the cloud.The Provable Data Possession (PDP) mechanism allows users or a Third-Party Auditor (TPA) appointed by the user to verify data integrity.In practice, data is usually maintained by multiple users.Users may reveal their identities while making an integrity verification request in traditional auditing processes.Anonymous cloud auditing ensures anonymity of users against the TPA during auditing.Currently, in identity-based systems, anonymous cloud auditing schemes usually resort to identity-based ring signature or group signature schemes.As a result, the size of a tag is related to the number of users, which makes it not compact and causes high storage cost.In order to solve this issue, a general construction of identity-based anonymous cloud auditing scheme was proposed.With a signature scheme and an anonymous cloud auditing scheme, a concrete identity-based anonymous cloud auditing scheme based on the general construction was proposed.It combined theBLS signature and an anonymous cloud auditing scheme with compact tags.The main advantage of this solution is that the tags are compact, which can significantly reduce storage cost and improve storage efficiency.Furthermore, the uncheatability and anonymity of the scheme are proved.
format Article
id doaj-art-3d089c5934c44892870a07d7bb21f6d6
institution Kabale University
issn 2096-109X
language English
publishDate 2022-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-3d089c5934c44892870a07d7bb21f6d62025-01-15T03:16:07ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-12-01815616859574743Identity-based anonymous cloud auditing scheme with compact tagsChenxin LUBing CHENNing DINGLiquan CHENGe WUCloud storage has the advantages of high efficiency and scalability.Users can save local storage cost and share data with others through cloud storage technology.However, when data is uploaded to cloud servers, its owner also loses the physical control, and hence there needs a corresponding mechanism to ensure the integrity of data stored in the cloud.The Provable Data Possession (PDP) mechanism allows users or a Third-Party Auditor (TPA) appointed by the user to verify data integrity.In practice, data is usually maintained by multiple users.Users may reveal their identities while making an integrity verification request in traditional auditing processes.Anonymous cloud auditing ensures anonymity of users against the TPA during auditing.Currently, in identity-based systems, anonymous cloud auditing schemes usually resort to identity-based ring signature or group signature schemes.As a result, the size of a tag is related to the number of users, which makes it not compact and causes high storage cost.In order to solve this issue, a general construction of identity-based anonymous cloud auditing scheme was proposed.With a signature scheme and an anonymous cloud auditing scheme, a concrete identity-based anonymous cloud auditing scheme based on the general construction was proposed.It combined theBLS signature and an anonymous cloud auditing scheme with compact tags.The main advantage of this solution is that the tags are compact, which can significantly reduce storage cost and improve storage efficiency.Furthermore, the uncheatability and anonymity of the scheme are proved.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022087cloud auditingprivacy protectionanonymousidentity-based systemcompact tags
spellingShingle Chenxin LU
Bing CHEN
Ning DING
Liquan CHEN
Ge WU
Identity-based anonymous cloud auditing scheme with compact tags
网络与信息安全学报
cloud auditing
privacy protection
anonymous
identity-based system
compact tags
title Identity-based anonymous cloud auditing scheme with compact tags
title_full Identity-based anonymous cloud auditing scheme with compact tags
title_fullStr Identity-based anonymous cloud auditing scheme with compact tags
title_full_unstemmed Identity-based anonymous cloud auditing scheme with compact tags
title_short Identity-based anonymous cloud auditing scheme with compact tags
title_sort identity based anonymous cloud auditing scheme with compact tags
topic cloud auditing
privacy protection
anonymous
identity-based system
compact tags
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022087
work_keys_str_mv AT chenxinlu identitybasedanonymouscloudauditingschemewithcompacttags
AT bingchen identitybasedanonymouscloudauditingschemewithcompacttags
AT ningding identitybasedanonymouscloudauditingschemewithcompacttags
AT liquanchen identitybasedanonymouscloudauditingschemewithcompacttags
AT gewu identitybasedanonymouscloudauditingschemewithcompacttags