Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Trusted integrity verification scheme of cloud data without bilinear pairings
Wenyong YUAN, Xiuguang LI, Ruifeng LI, Zhengge YI, Xiaoyuan YANG
Journal of Computer Applications    2022, 42 (12): 3769-3774.   DOI: 10.11772/j.issn.1001-9081.2021101780
Abstract232)   HTML6)    PDF (1345KB)(76)       Save

Focusing on the malicious cheating behaviors of Third Party Auditor (TPA) in cloud audit, a trusted cloud auditing scheme without bilinear pairings was proposed to support the correct judgment of the behaviors of TPA. Firstly, the pseudo-random bit generator was used to generate random challenge information, which ensured the reliability of the challenge information generated by TPA. Secondly, the hash value was added in the process of evidence generation to protect the privacy of user data effectively. Thirdly, in the process of evidence verification, the interactive process between users and TPA results was added. The data integrity was checked and whether TPA had completed the audit request truthfully or not was judged according to the above results. Finally, the scheme was extended to realize batch audit of multiple data. Security analysis shows that the proposed scheme can resist substitution attack and forgery attack, and can protect data privacy. Compared with Merkle-Hash-Tree based Without Bilinear PAiring (MHT-WiBPA) audit scheme, the proposed scheme has close time for verifying evidence, and the time for generating labels reduced by about 49.96%. Efficiency analysis shows that the proposed scheme can achieve lower computational cost and communication cost on the premise of ensuring the credibility of audit results.

Table and Figures | Reference | Related Articles | Metrics