The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity auditing schemes would inevitably become unable to work. To deal with this problem, we construct a novel and efficient identity-based data integrity auditing scheme with key-exposure resilience for cloud storage. This is achieved by designing a novel key update technique, which is fully compatible with BLS signature used in identity-based data integrity auditing. In our design, the Third Party Auditor (TPA) is responsible for generating update information. The user can update his private key based on the private key in one previous time period and the update information from the TPA. Furthermore, the proposed scheme supports real lazy update, which greatly improves the efficiency and the feasibility of key update. Meanwhile, the proposed scheme relies on identity-based cryptography, which makes certificate management easy. The security proof and the performance analysis demonstrate that the proposed scheme achieves desirable security and efficiency.
CITATION STYLE
Shen, W., Yu, J., Yang, M., & Hu, J. (2023). Efficient Identity-Based Data Integrity Auditing with Key-Exposure Resistance for Cloud Storage. IEEE Transactions on Dependable and Secure Computing, 20(6), 4593–4606. https://doi.org/10.1109/TDSC.2022.3228699
Mendeley helps you to discover research relevant for your work.