Journal on Communications ›› 2015, Vol. 36 ›› Issue (10): 278-286.doi: 10.11959/j.issn.1000-436x.2015232

• Academic communication • Previous Articles    

Integrity checking protocol with identity-based proxy signature in mobile cloud computing

Li YAN,Run-hua SHI,Hong ZHONG,Jie CUI,Shun ZHANG,Yan XU   

  1. School of Computer Science and Technology,Anhui University,Hefei 230601,China
  • Online:2015-10-25 Published:2015-10-27
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;Specialized Research Fund for the Doctoral Program of Higher Education;The Natural Science Foundation of Anhui Province;The Natural Science Foundation of Anhui Province;The “211” Project of Anhui University;The “211” Project of Anhui University

Abstract:

Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an identity-based proxy signature PDP(IBPS-PDP)protocol was presented.By using identity-based signatures,the system did not need to manage public key certificates and further the users did not need to take the additional computations to verify the other’s certificates yet.Finally,the security of the proposed IBPS-PDP protocol is proved in the random oracle model.

Key words: mobile cloud computing, data integrity, identity-base signature, proxy signature

No Suggested Reading articles found!