Visible to the public Identity-based remote data possession checking in public clouds

TitleIdentity-based remote data possession checking in public clouds
Publication TypeJournal Article
Year of Publication2014
AuthorsHuaqun Wang, Qianhong Wu, Bo Qin, Domingo-Ferrer, J.
JournalInformation Security, IET
Volume8
Pagination114-121
Date PublishedMarch
ISSN1751-8709
Keywordscertificate management elimination, cloud computing, cloud server, cryptographic protocols, data outsourcing, ID-RDPC protocol, identity-based RDPC protocols, identity-based remote data possession checking protocol, PKI setting, public cloud storage, public key cryptography, public key infrastructure, spam, standard computational Diffie-Hellman problem, storage management, unsolicited e-mail
Abstract

Checking remote data possession is of crucial importance in public cloud storage. It enables the users to check whether their outsourced data have been kept intact without downloading the original data. The existing remote data possession checking (RDPC) protocols have been designed in the PKI (public key infrastructure) setting. The cloud server has to validate the users' certificates before storing the data uploaded by the users in order to prevent spam. This incurs considerable costs since numerous users may frequently upload data to the cloud server. This study addresses this problem with a new model of identity-based RDPC (ID-RDPC) protocols. The authors present the first ID-RDPC protocol proven to be secure assuming the hardness of the standard computational Diffie-Hellman problem. In addition to the structural advantage of elimination of certificate management and verification, the authors ID-RDPC protocol also outperforms the existing RDPC protocols in the PKI setting in terms of computation and communication.

URLhttp://ieeexplore.ieee.org/document/6748545/
DOI10.1049/iet-ifs.2012.0271
Citation Key6748545