JOURNAL ARTICLE

ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security

Hong JiangMingming XieBaoyuan KangChunqing LiLin Si

Year: 2018 Journal:   Wuhan University Journal of Natural Sciences Vol: 23 (4)Pages: 362-368   Publisher: Springer Science+Business Media

Abstract

Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.

Keywords:
Computer science Cloud computing Data integrity Computer security Audit Cloud storage Protocol (science) Random oracle Public-key cryptography Authentication (law) Database Encryption Operating system Accounting

Metrics

9
Cited By
1.34
FWCI (Field Weighted Citation Impact)
34
Refs
0.85
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

An improved public auditing protocol for cloud storage integrity checking

Jindan ZhangBaocang Wang

Journal:   International Journal of Web and Grid Services Year: 2019 Vol: 15 (3)Pages: 282-282
JOURNAL ARTICLE

ID Based Data Integrity Checking in Public Cloud

Pooja G. NatuShikha Pachouly

Journal:   International Journal Of Scientific Research And Education Year: 2015
BOOK-CHAPTER

A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage

Mihir R. GohelBhavesh N. Gohil

IFIP International Federation for Information Processing/IFIP Year: 2012 Pages: 240-246
© 2026 ScienceGate Book Chapters — All rights reserved.