ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on Data Storage & Security in Cloud Using RDIC & ID by PKI

Journal: International Journal of Engineering and Techniques (Vol.4, No. 1)

Publication Date:

Authors : ;

Page : 269-273

Keywords : Cloud Computing; Privacy preserving; Key homomorphic cryptography; Performance; Security.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Remote data integrity checking (RDIC) enables a data storage server, verbalizes a cloud server, to prove to a verifier that it is genuinely storing a data owner's data veraciously. To date, a number of RDIC protocols have been proposed in the literature, but most of the constructions suffer from the issue of an intricate key management, that is, they rely on the extravagant public key infrastructure (PKI), which might obstruct the deployment of RDIC in practice. In this paper, we propose an incipient construction of identitypredicated (ID-predicated) RDIC protocol by making utilization of key-homomorphic cryptographic primitive to reduce the system involution and the cost for establishing and managing the public key authentication framework in PKI predicated RDIC schemes. We formalize ID-predicated RDIC and its security model including security against a malevolent cloud server and zero erudition privacy against a third party verifier. The proposed ID-predicated RDIC protocol leaks no information of the stored data to the verifier during the RDIC process. The incipient construction is proven secure against the malignant server in the generic group model and achieves zero cognizance privacy against a verifier. Extensive security analysis and implementation results demonstrate that the proposed protocol is provably secure and practical in the authentic-world applications.

Last modified: 2018-05-22 14:22:20