Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group
The pandemic of COVID-19 has posed a severe challenge to the traditional on-site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing c...
Gespeichert in:
Veröffentlicht in: | Wireless communications and mobile computing 2022-02, Vol.2022, p.1-16 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 16 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2022 |
creator | Han, Chunxia Wang, Linjie |
description | The pandemic of COVID-19 has posed a severe challenge to the traditional on-site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing capability and abundant storage space; so far wide research has been proposed to verify data integrity. Therefore, how to leverage the cloud server and ensure the integrity of the data (especially the encrypted data) stored on the remote cloud devices remains an issue for the clients. To address this issue, we utilize the technique of homomorphic hash function to implement reencryption ciphertext blocks and introduce a certificateless signature scheme for the integrity verification of encrypted data shared within a group. A detailed challenge-and-response game represents that the proposed scheme can preserve encrypted data blocks integrity against the internal/external attacker and malicious cloud service servers. We give the theoretical and experimental performance analysis of the scheme and exhibit that the scheme is efficient and practical. |
doi_str_mv | 10.1155/2022/1493768 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2636151388</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2636151388</sourcerecordid><originalsourceid>FETCH-LOGICAL-c294t-7c2bc3c36fdce9bde20f4464a640ca1820cb3622197c198e9e19ab256e073f1d3</originalsourceid><addsrcrecordid>eNp9kEFLwzAYhoMoOKc3f0DAo9blS9q0OY4552CiMD2HNEm3jNnUNGXs369jw6On9z08fB_vg9A9kGeALBtRQukIUsFyXlygAWSMJAXP88u_zsU1umnbDSGEEQoD9P7ZlVun8byOdhVc3ONxZ1x09Qr7Ci_XKliDp7UO-yb27UVFhXcurl2NJ1vfGbyMPqiVxbPgu-YWXVVq29q7cw7R9-v0a_KWLD5m88l4kWgq0pjkmpaaacYro60ojaWkSlOeKp4SraCgRJeMUwoi1yAKKywIVdKMW5KzCgwboofT3Sb43862UW58F-r-paSccciAFUVPPZ0oHXzbBlvJJrgfFfYSiDwKk0dh8iysxx9PeD_OqJ37nz4A85tpjQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2636151388</pqid></control><display><type>article</type><title>Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Han, Chunxia ; Wang, Linjie</creator><contributor>Wang, Yingjie ; Yingjie Wang</contributor><creatorcontrib>Han, Chunxia ; Wang, Linjie ; Wang, Yingjie ; Yingjie Wang</creatorcontrib><description>The pandemic of COVID-19 has posed a severe challenge to the traditional on-site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing capability and abundant storage space; so far wide research has been proposed to verify data integrity. Therefore, how to leverage the cloud server and ensure the integrity of the data (especially the encrypted data) stored on the remote cloud devices remains an issue for the clients. To address this issue, we utilize the technique of homomorphic hash function to implement reencryption ciphertext blocks and introduce a certificateless signature scheme for the integrity verification of encrypted data shared within a group. A detailed challenge-and-response game represents that the proposed scheme can preserve encrypted data blocks integrity against the internal/external attacker and malicious cloud service servers. We give the theoretical and experimental performance analysis of the scheme and exhibit that the scheme is efficient and practical.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2022/1493768</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Algorithms ; Auditing ; Cloud computing ; Collaboration ; Cooperation ; COVID-19 ; Data integrity ; Data storage ; Encryption ; Engineers ; Information sharing ; Integrity</subject><ispartof>Wireless communications and mobile computing, 2022-02, Vol.2022, p.1-16</ispartof><rights>Copyright © 2022 Chunxia Han and Linjie Wang.</rights><rights>Copyright © 2022 Chunxia Han and Linjie Wang. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c294t-7c2bc3c36fdce9bde20f4464a640ca1820cb3622197c198e9e19ab256e073f1d3</cites><orcidid>0000-0003-4514-6671</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Wang, Yingjie</contributor><contributor>Yingjie Wang</contributor><creatorcontrib>Han, Chunxia</creatorcontrib><creatorcontrib>Wang, Linjie</creatorcontrib><title>Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group</title><title>Wireless communications and mobile computing</title><description>The pandemic of COVID-19 has posed a severe challenge to the traditional on-site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing capability and abundant storage space; so far wide research has been proposed to verify data integrity. Therefore, how to leverage the cloud server and ensure the integrity of the data (especially the encrypted data) stored on the remote cloud devices remains an issue for the clients. To address this issue, we utilize the technique of homomorphic hash function to implement reencryption ciphertext blocks and introduce a certificateless signature scheme for the integrity verification of encrypted data shared within a group. A detailed challenge-and-response game represents that the proposed scheme can preserve encrypted data blocks integrity against the internal/external attacker and malicious cloud service servers. We give the theoretical and experimental performance analysis of the scheme and exhibit that the scheme is efficient and practical.</description><subject>Algorithms</subject><subject>Auditing</subject><subject>Cloud computing</subject><subject>Collaboration</subject><subject>Cooperation</subject><subject>COVID-19</subject><subject>Data integrity</subject><subject>Data storage</subject><subject>Encryption</subject><subject>Engineers</subject><subject>Information sharing</subject><subject>Integrity</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp9kEFLwzAYhoMoOKc3f0DAo9blS9q0OY4552CiMD2HNEm3jNnUNGXs369jw6On9z08fB_vg9A9kGeALBtRQukIUsFyXlygAWSMJAXP88u_zsU1umnbDSGEEQoD9P7ZlVun8byOdhVc3ONxZ1x09Qr7Ci_XKliDp7UO-yb27UVFhXcurl2NJ1vfGbyMPqiVxbPgu-YWXVVq29q7cw7R9-v0a_KWLD5m88l4kWgq0pjkmpaaacYro60ojaWkSlOeKp4SraCgRJeMUwoi1yAKKywIVdKMW5KzCgwboofT3Sb43862UW58F-r-paSccciAFUVPPZ0oHXzbBlvJJrgfFfYSiDwKk0dh8iysxx9PeD_OqJ37nz4A85tpjQ</recordid><startdate>20220225</startdate><enddate>20220225</enddate><creator>Han, Chunxia</creator><creator>Wang, Linjie</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>COVID</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-4514-6671</orcidid></search><sort><creationdate>20220225</creationdate><title>Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group</title><author>Han, Chunxia ; Wang, Linjie</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c294t-7c2bc3c36fdce9bde20f4464a640ca1820cb3622197c198e9e19ab256e073f1d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Auditing</topic><topic>Cloud computing</topic><topic>Collaboration</topic><topic>Cooperation</topic><topic>COVID-19</topic><topic>Data integrity</topic><topic>Data storage</topic><topic>Encryption</topic><topic>Engineers</topic><topic>Information sharing</topic><topic>Integrity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Han, Chunxia</creatorcontrib><creatorcontrib>Wang, Linjie</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Coronavirus Research Database</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Han, Chunxia</au><au>Wang, Linjie</au><au>Wang, Yingjie</au><au>Yingjie Wang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2022-02-25</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>16</epage><pages>1-16</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>The pandemic of COVID-19 has posed a severe challenge to the traditional on-site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing capability and abundant storage space; so far wide research has been proposed to verify data integrity. Therefore, how to leverage the cloud server and ensure the integrity of the data (especially the encrypted data) stored on the remote cloud devices remains an issue for the clients. To address this issue, we utilize the technique of homomorphic hash function to implement reencryption ciphertext blocks and introduce a certificateless signature scheme for the integrity verification of encrypted data shared within a group. A detailed challenge-and-response game represents that the proposed scheme can preserve encrypted data blocks integrity against the internal/external attacker and malicious cloud service servers. We give the theoretical and experimental performance analysis of the scheme and exhibit that the scheme is efficient and practical.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2022/1493768</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-4514-6671</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2022-02, Vol.2022, p.1-16 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2636151388 |
source | Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Algorithms Auditing Cloud computing Collaboration Cooperation COVID-19 Data integrity Data storage Encryption Engineers Information sharing Integrity |
title | Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T20%3A35%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Public%20Integrity%20Auditing%20of%20Shared%20Encrypted%20Data%20within%20Cloud%20Storage%20Group&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Han,%20Chunxia&rft.date=2022-02-25&rft.volume=2022&rft.spage=1&rft.epage=16&rft.pages=1-16&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2022/1493768&rft_dat=%3Cproquest_cross%3E2636151388%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2636151388&rft_id=info:pmid/&rfr_iscdi=true |