Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group

The pandemic of COVID-19 has posed a severe challenge to the traditional on-site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing c...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless communications and mobile computing 2022-02, Vol.2022, p.1-16
Hauptverfasser: Han, Chunxia, Wang, Linjie
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 16
container_issue
container_start_page 1
container_title Wireless communications and mobile computing
container_volume 2022
creator Han, Chunxia
Wang, Linjie
description The pandemic of COVID-19 has posed a severe challenge to the traditional on-site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing capability and abundant storage space; so far wide research has been proposed to verify data integrity. Therefore, how to leverage the cloud server and ensure the integrity of the data (especially the encrypted data) stored on the remote cloud devices remains an issue for the clients. To address this issue, we utilize the technique of homomorphic hash function to implement reencryption ciphertext blocks and introduce a certificateless signature scheme for the integrity verification of encrypted data shared within a group. A detailed challenge-and-response game represents that the proposed scheme can preserve encrypted data blocks integrity against the internal/external attacker and malicious cloud service servers. We give the theoretical and experimental performance analysis of the scheme and exhibit that the scheme is efficient and practical.
doi_str_mv 10.1155/2022/1493768
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2636151388</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2636151388</sourcerecordid><originalsourceid>FETCH-LOGICAL-c294t-7c2bc3c36fdce9bde20f4464a640ca1820cb3622197c198e9e19ab256e073f1d3</originalsourceid><addsrcrecordid>eNp9kEFLwzAYhoMoOKc3f0DAo9blS9q0OY4552CiMD2HNEm3jNnUNGXs369jw6On9z08fB_vg9A9kGeALBtRQukIUsFyXlygAWSMJAXP88u_zsU1umnbDSGEEQoD9P7ZlVun8byOdhVc3ONxZ1x09Qr7Ci_XKliDp7UO-yb27UVFhXcurl2NJ1vfGbyMPqiVxbPgu-YWXVVq29q7cw7R9-v0a_KWLD5m88l4kWgq0pjkmpaaacYro60ojaWkSlOeKp4SraCgRJeMUwoi1yAKKywIVdKMW5KzCgwboofT3Sb43862UW58F-r-paSccciAFUVPPZ0oHXzbBlvJJrgfFfYSiDwKk0dh8iysxx9PeD_OqJ37nz4A85tpjQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2636151388</pqid></control><display><type>article</type><title>Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Han, Chunxia ; Wang, Linjie</creator><contributor>Wang, Yingjie ; Yingjie Wang</contributor><creatorcontrib>Han, Chunxia ; Wang, Linjie ; Wang, Yingjie ; Yingjie Wang</creatorcontrib><description>The pandemic of COVID-19 has posed a severe challenge to the traditional on-site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing capability and abundant storage space; so far wide research has been proposed to verify data integrity. Therefore, how to leverage the cloud server and ensure the integrity of the data (especially the encrypted data) stored on the remote cloud devices remains an issue for the clients. To address this issue, we utilize the technique of homomorphic hash function to implement reencryption ciphertext blocks and introduce a certificateless signature scheme for the integrity verification of encrypted data shared within a group. A detailed challenge-and-response game represents that the proposed scheme can preserve encrypted data blocks integrity against the internal/external attacker and malicious cloud service servers. We give the theoretical and experimental performance analysis of the scheme and exhibit that the scheme is efficient and practical.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2022/1493768</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Algorithms ; Auditing ; Cloud computing ; Collaboration ; Cooperation ; COVID-19 ; Data integrity ; Data storage ; Encryption ; Engineers ; Information sharing ; Integrity</subject><ispartof>Wireless communications and mobile computing, 2022-02, Vol.2022, p.1-16</ispartof><rights>Copyright © 2022 Chunxia Han and Linjie Wang.</rights><rights>Copyright © 2022 Chunxia Han and Linjie Wang. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c294t-7c2bc3c36fdce9bde20f4464a640ca1820cb3622197c198e9e19ab256e073f1d3</cites><orcidid>0000-0003-4514-6671</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Wang, Yingjie</contributor><contributor>Yingjie Wang</contributor><creatorcontrib>Han, Chunxia</creatorcontrib><creatorcontrib>Wang, Linjie</creatorcontrib><title>Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group</title><title>Wireless communications and mobile computing</title><description>The pandemic of COVID-19 has posed a severe challenge to the traditional on-site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing capability and abundant storage space; so far wide research has been proposed to verify data integrity. Therefore, how to leverage the cloud server and ensure the integrity of the data (especially the encrypted data) stored on the remote cloud devices remains an issue for the clients. To address this issue, we utilize the technique of homomorphic hash function to implement reencryption ciphertext blocks and introduce a certificateless signature scheme for the integrity verification of encrypted data shared within a group. A detailed challenge-and-response game represents that the proposed scheme can preserve encrypted data blocks integrity against the internal/external attacker and malicious cloud service servers. We give the theoretical and experimental performance analysis of the scheme and exhibit that the scheme is efficient and practical.</description><subject>Algorithms</subject><subject>Auditing</subject><subject>Cloud computing</subject><subject>Collaboration</subject><subject>Cooperation</subject><subject>COVID-19</subject><subject>Data integrity</subject><subject>Data storage</subject><subject>Encryption</subject><subject>Engineers</subject><subject>Information sharing</subject><subject>Integrity</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp9kEFLwzAYhoMoOKc3f0DAo9blS9q0OY4552CiMD2HNEm3jNnUNGXs369jw6On9z08fB_vg9A9kGeALBtRQukIUsFyXlygAWSMJAXP88u_zsU1umnbDSGEEQoD9P7ZlVun8byOdhVc3ONxZ1x09Qr7Ci_XKliDp7UO-yb27UVFhXcurl2NJ1vfGbyMPqiVxbPgu-YWXVVq29q7cw7R9-v0a_KWLD5m88l4kWgq0pjkmpaaacYro60ojaWkSlOeKp4SraCgRJeMUwoi1yAKKywIVdKMW5KzCgwboofT3Sb43862UW58F-r-paSccciAFUVPPZ0oHXzbBlvJJrgfFfYSiDwKk0dh8iysxx9PeD_OqJ37nz4A85tpjQ</recordid><startdate>20220225</startdate><enddate>20220225</enddate><creator>Han, Chunxia</creator><creator>Wang, Linjie</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>COVID</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-4514-6671</orcidid></search><sort><creationdate>20220225</creationdate><title>Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group</title><author>Han, Chunxia ; Wang, Linjie</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c294t-7c2bc3c36fdce9bde20f4464a640ca1820cb3622197c198e9e19ab256e073f1d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Auditing</topic><topic>Cloud computing</topic><topic>Collaboration</topic><topic>Cooperation</topic><topic>COVID-19</topic><topic>Data integrity</topic><topic>Data storage</topic><topic>Encryption</topic><topic>Engineers</topic><topic>Information sharing</topic><topic>Integrity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Han, Chunxia</creatorcontrib><creatorcontrib>Wang, Linjie</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Coronavirus Research Database</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Han, Chunxia</au><au>Wang, Linjie</au><au>Wang, Yingjie</au><au>Yingjie Wang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2022-02-25</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>16</epage><pages>1-16</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>The pandemic of COVID-19 has posed a severe challenge to the traditional on-site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing capability and abundant storage space; so far wide research has been proposed to verify data integrity. Therefore, how to leverage the cloud server and ensure the integrity of the data (especially the encrypted data) stored on the remote cloud devices remains an issue for the clients. To address this issue, we utilize the technique of homomorphic hash function to implement reencryption ciphertext blocks and introduce a certificateless signature scheme for the integrity verification of encrypted data shared within a group. A detailed challenge-and-response game represents that the proposed scheme can preserve encrypted data blocks integrity against the internal/external attacker and malicious cloud service servers. We give the theoretical and experimental performance analysis of the scheme and exhibit that the scheme is efficient and practical.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2022/1493768</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-4514-6671</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2022-02, Vol.2022, p.1-16
issn 1530-8669
1530-8677
language eng
recordid cdi_proquest_journals_2636151388
source Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Algorithms
Auditing
Cloud computing
Collaboration
Cooperation
COVID-19
Data integrity
Data storage
Encryption
Engineers
Information sharing
Integrity
title Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T20%3A35%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Public%20Integrity%20Auditing%20of%20Shared%20Encrypted%20Data%20within%20Cloud%20Storage%20Group&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Han,%20Chunxia&rft.date=2022-02-25&rft.volume=2022&rft.spage=1&rft.epage=16&rft.pages=1-16&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2022/1493768&rft_dat=%3Cproquest_cross%3E2636151388%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2636151388&rft_id=info:pmid/&rfr_iscdi=true