Securing Cloud Storage by Remote DataIntegrity Check with Secured Key Generation

来源 :电子学报(英文版) | 被引量 : 0次 | 上传用户:HUANGKAO2
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In recent decades, a number of protocols for Remote data integrity checking (RDIC) have been proposed.Identity (ID) based RDIC protocols are constructed to guarantee cloud data integrity and data privacy. The known protocols for RDIC always assume that the Private key generator (PKG) is a trusted one, but in real-world applications by corrupt PKG, malicious Cloud server (CS) can easily cheat the third party auditor that the data owner's outsourced data are kept safe through the data has been deleted or altered. In this paper, we explore the novel model of RDIC with untrusted PKG and malicious CS, by employing the partial key method and Authentication, authorization, accounting (AAA) service. We construct a new ID-based RDIC, which provides the ID revocation and key updation. The experimental evaluations show that our scheme is more efficient than known ones.
其他文献
Compared with traditional endonasal endoscope, Virtual endonasal endoscope (VEE) is a computerized alternative solution with the advantages of being non-invasiv
A novel High-order extended Kalman Filter (HEKF) is designed for a class of complex dynamic systems with polynomial nonlinearities. The state and measurement mo
This paper presents the design and analysis of a distributed power amplifier with 6-dB bandwidth from 10MHz to 6GHz. To meet the stringent targeted specificatio