Journal on Communications ›› 2018, Vol. 39 ›› Issue (11): 98-105.doi: 10.11959/j.issn.1000-436x.2018229

• Papers • Previous Articles     Next Articles

Analysis and improvement on identity-based cloud data integrity verification scheme

Shaohui WANG1,2,Xiaoxiao PAN1,2,Zhiwei WANG1,2,Fu XIAO1,2,Ruchuan WANG1,2   

  1. 1 College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
    2 Key Laboratory of Jiangsu High Technology Research for Wireless Sensor Network,Nanjing 210003,China
  • Revised:2018-10-11 Online:2018-11-01 Published:2018-12-10
  • Supported by:
    The National Natural Science Foundation of China(61373006);The National Natural Science Foundation of China(61373139);The National Natural Science Foundation of China(61672016);The National Natural Science Foundation of China(61872192);The Scientific of Technolgical Suppovt Project of Jiangsu Province(61003236)

Abstract:

Many individuals or businesses outsource their data to remote cloud.Cloud storage provides users the advantages of economic convenience,but data owners no longer physically control over the stored data,which introduces new security challenges,such as no security guarantees of integrity and privacy.The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed.It shows that Zhang et al.’s scheme is subjected to secret key recovery attack for the cloud servers can recover user’s private key only utilizing stored data.And Xu et al.’s scheme cannot satisfy security requirements of soundness.Based on Xu et al.'s scheme,a modified identity-based cloud data integrity verification scheme is proposed.A comprehensive analysis shows the new scheme can provide the security requirements of soundness and privacy,and has the same communication overhead and computational cost as Xu et al.’s scheme.

Key words: cloud storage, identity-based cryptosystem, data integrity, privacy

CLC Number: 

No Suggested Reading articles found!