Skip to main content
Erschienen in: Neural Computing and Applications 5/2019

06.06.2018 | S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

Certificateless remote data integrity checking using lattices in cloud storage

verfasst von: C. Sasikala, C. Shoba Bindu

Erschienen in: Neural Computing and Applications | Ausgabe 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the existence of many security threats in the cloud, remote data integrity checking (RDIC) is crucial for implementing secure cloud storage. It allows the data users to check the integrity of their data without retrieving whole data. As a solution to this, so far many researchers designed RDIC protocols using public key infrastructure (PKI). In this scenario, a public verifier must approve the data users’ certificates before the integrity checking task is to be performed. Thus, it suffers from the complex key management problem to approve the certificates, and it also incurs high computation cost over the public verifier. To solve the certificate management issue in PKI-based protocols and to provide security against quantum computer attacks, in this work, we design a Certificateless RDIC protocol using lattices. In this approach, the data integrity checking can be initiated using data owner’s identity (his name or email address) along with some secret information, which can guarantee the right public key is used for RDIC. Therefore, we can avoid the certificate management issue in PKI-based protocols to verify the data integrity. Finally, our security analysis guarantees that our Certificateless RDIC protocol is secure and it provides the privacy against the verifier, and performance analysis guarantees that it makes the less computation overhead over the public verifier.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef
3.
Zurück zum Zitat Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: The Proceedings of ACM CCS 2007, pp 598–610 Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: The Proceedings of ACM CCS 2007, pp 598–610
4.
Zurück zum Zitat Wang C, Wang Q, Ren K, Lou WJ (2010) Privacy—preserving public auditing for data storage security in Cloud Computing, In: Proceedings IEEE INFOCOM, San Diego, pp 1–9 Wang C, Wang Q, Ren K, Lou WJ (2010) Privacy—preserving public auditing for data storage security in Cloud Computing, In: Proceedings IEEE INFOCOM, San Diego, pp 1–9
5.
Zurück zum Zitat Ateniese G, Pietro RD, Mancini LV, Sudik T (2008) Scalable and efficient Provable data possession. In: Proceedings of the 4th international conference on security and privacy in communication networks. Istanbul, Turkey. ACM, pp 1–10 Ateniese G, Pietro RD, Mancini LV, Sudik T (2008) Scalable and efficient Provable data possession. In: Proceedings of the 4th international conference on security and privacy in communication networks. Istanbul, Turkey. ACM, pp 1–10
6.
Zurück zum Zitat Shacham H, Waters B (2008) Compact proofs of retrievability. In: International conference on Advances in Cryptography-ASIACRYPT 2008. Springer, Berlin, pp. 90–107 Shacham H, Waters B (2008) Compact proofs of retrievability. In: International conference on Advances in Cryptography-ASIACRYPT 2008. Springer, Berlin, pp. 90–107
7.
Zurück zum Zitat Juels A, Kaliski BS (2007) Proofs of retrievability for large files. In: Proc. 14th ACM Conf. Computer and Communication Security (CCS’07), pp 584–597 Juels A, Kaliski BS (2007) Proofs of retrievability for large files. In: Proc. 14th ACM Conf. Computer and Communication Security (CCS’07), pp 584–597
8.
Zurück zum Zitat Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H, Yau SS (2011) Dynamic audit services for integrity verification of outsourced storage in clouds. In: the Proceedings of ACM SA, pp 1550–1557 Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H, Yau SS (2011) Dynamic audit services for integrity verification of outsourced storage in clouds. In: the Proceedings of ACM SA, pp 1550–1557
9.
Zurück zum Zitat Wang B, Li H, Li M (2013) Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: the Proceedings of IEEE ICC 2013, pp 62–74 Wang B, Li H, Li M (2013) Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: the Proceedings of IEEE ICC 2013, pp 62–74
10.
Zurück zum Zitat Zhao JN, Xu CX, Li FG, Zhang W (2013) Identity-based public verification with privacy-preserving for data storage security in cloud computing. IEICE Trans 96-A(12):2709–2716CrossRef Zhao JN, Xu CX, Li FG, Zhang W (2013) Identity-based public verification with privacy-preserving for data storage security in cloud computing. IEICE Trans 96-A(12):2709–2716CrossRef
11.
Zurück zum Zitat Wang H (2015) Identity-based distributed provable data possession in multi cloud storage. IEEE Trans Serv Comput 8(2):328–340CrossRef Wang H (2015) Identity-based distributed provable data possession in multi cloud storage. IEEE Trans Serv Comput 8(2):328–340CrossRef
12.
Zurück zum Zitat Wang H, Wu Q, Qin B, Domingo-Ferrer J (2014) Identity-based remote data possession checking in public clouds. IET Inf Secur 8(2):114–121CrossRef Wang H, Wu Q, Qin B, Domingo-Ferrer J (2014) Identity-based remote data possession checking in public clouds. IET Inf Secur 8(2):114–121CrossRef
13.
Zurück zum Zitat Zhang J, Dong Q (2016) Efficient id-based public auditing for the outsourced data in cloud storage. Inf Sci 343:1–14MathSciNet Zhang J, Dong Q (2016) Efficient id-based public auditing for the outsourced data in cloud storage. Inf Sci 343:1–14MathSciNet
14.
Zurück zum Zitat Yu Y, Au MH, Ateniese G (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Tran Inf Forensics Secur 12(4):767–778CrossRef Yu Y, Au MH, Ateniese G (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Tran Inf Forensics Secur 12(4):767–778CrossRef
15.
Zurück zum Zitat Al-Riyami S, Paterson KG (2003) Certificateless public key cryptography. In: the Proceedings of ASIACRYPT 2003. Springer, pp 452–473 Al-Riyami S, Paterson KG (2003) Certificateless public key cryptography. In: the Proceedings of ASIACRYPT 2003. Springer, pp 452–473
17.
Zurück zum Zitat Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th annual ACM symposium on Theory of computing. ACM, pp 197–206 Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th annual ACM symposium on Theory of computing. ACM, pp 197–206
18.
Zurück zum Zitat David C, Hofheinz D, Kiltz E (2009) How to delegate a lattice basis. J IACR Cryptol ePrint Arch 25:351–362MATH David C, Hofheinz D, Kiltz E (2009) How to delegate a lattice basis. J IACR Cryptol ePrint Arch 25:351–362MATH
Metadaten
Titel
Certificateless remote data integrity checking using lattices in cloud storage
verfasst von
C. Sasikala
C. Shoba Bindu
Publikationsdatum
06.06.2018
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 5/2019
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-018-3546-6

Weitere Artikel der Ausgabe 5/2019

Neural Computing and Applications 5/2019 Zur Ausgabe

S.I.: Emerging Intelligent Algorithms for Edge-of-Things Computing

A new binary salp swarm algorithm: development and application for optimization tasks

S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

Classifying streaming of Twitter data based on sentiment analysis using hybridization

S.I.: Emerging Intelligent Algorithms for Edge-of-Things Computing

Using hardware counter-based performance model to diagnose scaling issues of HPC applications

S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

Gray relational clustering model for intelligent guided monitoring horizontal wells