2021
DOI: 10.1109/tcc.2019.2921553
|View full text |Cite
|
Sign up to set email alerts
|

Data Integrity Auditing without Private Key Storage for Secure Cloud Storage

Abstract: Using cloud storage services, users can store their data in the cloud to avoid the expenditure of local data storage and maintenance. To ensure the integrity of the data stored in the cloud, many data integrity auditing schemes have been proposed. In most, if not all, of the existing schemes, a user needs to employ his private key to generate the data authenticators for realizing the data integrity auditing. Thus, the user has to possess a hardware token (e.g. USB token, smart card) to store his private key an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 59 publications
(44 citation statements)
references
References 41 publications
0
44
0
Order By: Relevance
“…Apart from the aforementioned protocols, some other publicly verifiable protocols are published. Hao et al [41] gave a public verification without including a TPA, and Shen et al [42] solved the loss of private key for auditing issue. Wu et al [43] introduced a time encapsulated POR protocol that could check the integrity of data and timestamp by verifier.…”
Section: Related Workmentioning
confidence: 99%
“…Apart from the aforementioned protocols, some other publicly verifiable protocols are published. Hao et al [41] gave a public verification without including a TPA, and Shen et al [42] solved the loss of private key for auditing issue. Wu et al [43] introduced a time encapsulated POR protocol that could check the integrity of data and timestamp by verifier.…”
Section: Related Workmentioning
confidence: 99%
“…As future research, this scheme can be modified using IO to reduce verification cost. Shen et al [104] explored how to employ fuzzy private key for integrity auditing without storing private key. We can improve Zhang et al [47] scheme by this fuzzy approach where cloud user has to share the MAC key with TPA through secure channel.…”
Section: New Challenges and Recommendationsmentioning
confidence: 99%
“…For this reason, Zhang et al [26] proposed an identity-based audit scheme by introducing a hierarchical private key generator suitable for large-scale user groups, which improved the audit efficiency of large-scale users. Shen et al [27] proposed a data integrity audit scheme without storing private keys in which biometric data (such as iris scan and fingerprint) were used as the fuzzy private key of the user to avoid using hardware token, which improved the security and efficiency of audit. However, these schemes did not support the protection of sensitive information of user data and dynamic update.…”
Section: Related Workmentioning
confidence: 99%