JOURNAL ARTICLE

A Secure Certificate-Based Data Integrity Auditing Protocol with Cloud Service Providers

Yuan TianXuan ZhouTanping ZhouWeidong ZhongRuifeng LiXiaoyuan Yang

Year: 2024 Journal:   Mathematics Vol: 12 (13)Pages: 1964-1964   Publisher: Multidisciplinary Digital Publishing Institute

Abstract

With the surge in cloud storage popularity, more individuals are choosing to store large amounts of data on remote cloud service providers (CSPs) to save local storage resources. However, users’ primary worries revolve around maintaining data integrity and authenticity. Consequently, several cloud auditing methods have emerged to address these concerns. Many of these approaches rely on traditional public-key cryptography systems or are grounded in identity-based cryptography systems or certificateless cryptography systems. However, they are vulnerable to the increased costs linked with certificate management, key escrow, or the significant expenses of establishing a secure channel, respectively. To counter these limitations, Li et al. introduced a certificate-based cloud auditing protocol (LZ22), notable for its minimal tag generation overhead. Nonetheless, this protocol exhibits certain security vulnerabilities. In this paper, we devise a counterfeiting technique that allows the CSP to produce a counterfeit data block with an identical tag to the original one. Our counterfeiting method boasts a 100% success rate ∀ data block and operates with exceptional efficiency. The counterfeiting process for a single block of 10 kB, 50 kB, and 100 kB takes a maximum of 0.08 s, 0.51 s, and 1.04 s, respectively. By substituting the exponential component of homomorphic verifiable tags (HVTs) with non-public random elements, we formulate a secure certificate-based cloud auditing protocol. In comparison to the LZ22 protocol, the average tag generation overhead of our proposed protocol is reduced by 6.80%, 13.78%, and 8.66% for data sizes of 10 kB, 50 kB, and 100 kB, respectively. However, the auditing overhead of our proposed protocol shows an increase. The average overhead rises by 3.05%, 0.17%, and 0.45% over the LZ22 protocol’s overhead for data sizes of 10 kB, 50 kB, and 100 kB, correspondingly.

Keywords:
Computer science Computer security Cloud computing Public-key cryptography Cloud storage Cryptography Key escrow Protocol (science) Computer network Encryption Operating system

Metrics

1
Cited By
1.53
FWCI (Field Weighted Citation Impact)
54
Refs
0.78
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Blockchain Technology Applications and Security
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

An Efficient Certificate-Based Data Integrity Auditing Protocol for Cloud-Assisted WBANs

Yumei LiFutai Zhang

Journal:   IEEE Internet of Things Journal Year: 2021 Vol: 9 (13)Pages: 11513-11523
JOURNAL ARTICLE

A Compressive Integrity Auditing Protocol for Secure Cloud Storage

Yang YangYanjiao ChenFei Chen

Journal:   IEEE/ACM Transactions on Networking Year: 2021 Vol: 29 (3)Pages: 1197-1209
JOURNAL ARTICLE

Secure Blockchain Based Data Storage and Integrity Auditing in Cloud

M. Sumathi

Journal:   Turkish Journal of Computer and Mathematics Education (TURCOMAT) Year: 2021 Vol: 12 (9)Pages: 159-165
© 2026 ScienceGate Book Chapters — All rights reserved.