Abstract
Cloud storage is widely used by both individual and organizational users due to the many benefits, such as scalability, ubiquitous access, and low maintenance cost (and generally free for individual users). However, there are known security and privacy issues in migrating data to the cloud. To ensure or verify data integrity, a number of cloud data integrity checking schemes with different properties have been presented in the literature. Most existing schemes were subsequently found to be insecure or have high computation and communication costs. More recently in 2016, Yu et al. (Future Gener Comput Syst 62:85–91, 2016) proposed an identity-based auditing scheme for checking the integrity of cloud data. However, in this paper, we reveal that the scheme is vulnerable to data recovery attack. We also present a new identity-based public auditing scheme and formally prove the security of the scheme under the RSA assumption with large public exponents in the random oracle model. We then evaluate the performance of our proposed scheme and demonstrate that in comparison with Yu et al.’s scheme, our proposal is more practical in real-world applications.






Similar content being viewed by others
References
Quick D, Choo K-KR (2015) Impacts of increasing volume of digital forensic data: a survey and future research challenges. Digit Investig 11(4):273–294
Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1):69
Song D, Shi E, Fischer I, Shankar U (2012) Cloud data protection for the masses. J Computer 45(1):39–45
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352
Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716
Fu Z, Huang F, Sun X, Vasilakos A, Yang C-N (2016) Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Serv Comput doi:10.1109/TSC.2016.2622697
Osanaiye OA, Choo K-KR, Dlodlo ME (2016) Distributed denial of service (ddos) resilience in cloud: Review and conceptual cloud ddos mitigation framework. J Netw Comput Appl 67:147–165
Iqbal S, Kiah MLM, Dhaghighi B, Hussain M, Khan S, Khurram KM, Choo K-KR (2016) On cloud security attacks: a taxonomy and intrusion detection and prevention as a service. J Netw Comput Appl 74:98–120
Choo K-KR (2014) Legal issues in the cloud. IEEE Cloud Comput 1(1):94–96
Castiglione A, Palmieri F, Choo K-KR (2016) Enhanced network support for federated cloud infrastructures. IEEE Cloud Comput 3(3):16–23
Yavuz AA, Ning P (2009) Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems. In: Computer Security Applications Conference, 2009. ACSAC’09. Annual, pp 219–228, IEEE
Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200
Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM, 2010 proceedings IEEE, pp 1–9, Ieee
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608
Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netw 9(17):4002–4012
Juels A, Kaliski Jr BS (2007) Pors: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 584–597, ACM
Tate SR, Vishwanathan R, Everhart L (2013) Multi-user dynamic proofs of data possession using trusted hardware. In: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, pp 353–364, ACM
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 598–609, ACM
Worku SG, Xu C, Zhao J, He X (2014) Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng 40(5):1703–1713
Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–1726
Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859
Yu Y, Xue L, Au MH, Susilo W, Ni J, Zhang Y, Vasilakos AV, Shen J (2016) Cloud data integrity checking with an identity-based auditing mechanism from rsa. Future Gener Comput Syst 62:85–91
Shacham H, Waters B (2008) Compact proofs of retrievability. In: International Conference on the Theory and Application of Cryptology and Information Security, pp 90–107, Springer
Chen B, Curtmola R (2012) Robust dynamic provable data possession. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp 515–525, IEEE
Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, p 9, ACM
Ateniese G, Burns R, Curtmola R, Herring J, Khan O, Kissner L, Peterson Z, Song D (2011) Remote data checking using provable data possession. ACM Trans Inf Syst Secur (TISSEC) 14(1):12
Wang C, Chow SS, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375
Jining Z, Chunxiang X, Fagen L, Zhang W (2013) Identity-based public verification with privacy-preserving for data storage security in cloud computing. IEICE Trans Fundam Electron Commun Comput Sci 96(12):2709–2716
Wang H (2015) Identity-based distributed provable data possession in multicloud storage. IEEE Trans Serv Comput 8(2):328–340
Yu Y, Zhang Y, Mu Y, Susilo W, Liu H (2015) Provably secure identity based provable data possession. In: International Conference on Provable Security, pp 10–325, Springer
Zhang Y, Ni J, Tao X, Wang Y, Yu Y (2016) Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr Comput Pract Exp 28(4):1161–1173
Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361–396
Tang C-m, Zhang X-j (2015) A new publicly verifiable data possession on remote storage. J Supercomput, pp 1–15. doi:10.1007/s11227-015-1556-z
Li A, Tan S, Jia Y (2016) A method for achieving provable data integrity in cloud computing. J Supercomput, pp 1–17. doi:10.1007/s11227-015-1598-2
Scott M (2003) Miracl-multiprecision integer and rational arithmetic c/c++ library. Shamus Software Ltd, Dublin
Acknowledgements
L. Wu is supported by the National Natural Science Foundation of China (No. 61472287), and the Natural Science Foundation of Hubei Province of China (No. 2015CFA068). D. He is supported by the National Natural Science Foundation of China (Nos. 61501333, 61572379), the National High-tech R&D Program of China (863 Program) (No. 2015AA016004), and the Natural Science Foundation of Hubei Province of China (No. 2015CFB257). M. K. Khan is supported by the Deanship of Scientific Research at King Saud University (No. RGP-VPP-288). K.-K. R. Choo is supported by the Cloud Technology Endowed Professorship at The University of Texas at San Antonio.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xu, Z., Wu, L., Khan, M.K. et al. A secure and efficient public auditing scheme using RSA algorithm for cloud storage. J Supercomput 73, 5285–5309 (2017). https://doi.org/10.1007/s11227-017-2085-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-017-2085-8