Visible to the public Secure Protocol for Identity-based Provable Data Possession in Cloud Storage

TitleSecure Protocol for Identity-based Provable Data Possession in Cloud Storage
Publication TypeConference Paper
Year of Publication2019
AuthorsHunag, C., Yang, C., Weng, C., Chen, Y., Wang, S.
Conference Name2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)
KeywordsCloud Security, compositionality, cryptography, digital signature, Predictive Metrics, provable security, pubcrawl, remote data audit, Resiliency
AbstractRemote data possession is becoming an increasingly important issue in cloud storage. It enables users to verify if their outsourced data have remained intact while in cloud storage. The existing remote data audit (RDA) protocols were designed with the public key infrastructure (PKI) system. However, this incurs considerable costs when users need to frequently access data from the cloud service provider with PKI. This study proposes a protocol, called identity-based RDA (ID-RDA) that addresses this problem without the need for users' certificates. This study outperforms existing RDA protocols in computation and communication.
DOI10.1109/CCOMS.2019.8821766
Citation Keyhunag_secure_2019