An Efficient Identity-based Storage and Computation Auditing Protocol in Cloud Computing

سال انتشار: 1398
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 442

فایل این مقاله در 11 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ITCT07_018

تاریخ نمایه سازی: 2 دی 1398

چکیده مقاله:

Cloud computing is a paradigm to achieve reliable computational and storage capabilities for cloud users. Cloud security provides storage and computation security in way that cloud users can trust on the correctness of stored data and computation result. In 2014, the first privacy cheating discouragement and secure computation auditing protocol using designated verifier signatures named as SecCloud was proposed by Wei et al. In this paper, we modified the protocol to be more efficient and secure in this way it will be pairing-free and also session keys will be fresh for each message. Then, to guarantee that it is uncheatable and can satisfy privacy cheating discouragement, we show that underlying designated verifier signature is existentially unforgeable against adaptively chosen-message and identity attack under Computational Diffie-Hellman Problem (CDHP) in the random oracle model.

نویسندگان

Maryam Rahabzadeh Asaar

Department of Electrical and Computer Engineering, Islamic Azad University, Science and Research Branch, Tehran

Niloufar Vatanara

Department of Electrical and Computer Engineering, Islamic Azad University, Science and Research Branch, Tehran