Visible to the public Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices

TitleIdentity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
Publication TypeConference Paper
Year of Publication2017
AuthorsLiu, Z., Liao, Y., Yang, X., He, Y., Zhao, K.
Conference Name2017 3rd International Conference on Big Data Computing and Communications (BIGCOM)
Keywordscloud computing, cloud service provider attack, cloud storage, communication cost, cryptographic protocols, cryptography, data integrity, data integrity checking, Data models, data privacy, Human Behavior, ID-Based cryptography, Identity management, identity-based remote data integrity checking protocol, lattice-based constructed cryptography, Lattices, lost attack, matrix multiplication, matrix-matrix multiplication, matrix-vector multiplication, Protocols, provably secure, pubcrawl, public key cryptography, quantum computer attacks, remote data integrity checking protocols, Resiliency, Scalability, Servers, storage management, tamper attack, verification stage
AbstractIn cloud storage, remote data integrity checking is considered as a crucial technique about data owners who upload enormous data to cloud server provider. A majority of the existing remote data integrity checking protocols rely on the expensive public key infrastructure. In addition, the verification of certificates needs heavy computation and communication cost. Meanwhile, the existing some protocols are not secure under the quantum computer attacks. However, lattice-based constructed cryptography can resist quantum computer attacks and is fairly effective, involving matrix-matrix or matrix-vector multiplications. So, we propose an identity-based remote data integrity checking protocol from lattices, which can eliminate the certificate management process and resist quantum computer attacks. Our protocol is completeness and provably secure based on the hardness small integer solution assumption. The presented scheme is secure against cloud service provider attacks, and leaks no any blocks of the stored file to the third party auditor during verification stage, namely the data privacy against the curiosity third party auditor attacks. The cloud service provider attack includes lost attack and tamper attack. Furthermore, the performance analysis of some protocols demonstrate that our protocol of remote data integrity checking is useful and efficient.
DOI10.1109/BIGCOM.2017.29
Citation Keyliu_identity-based_2017