Computer and Modernization

Previous Articles     Next Articles

A Public Integrity Auditing Scheme Based on Blind Signature for Shared Data in Cloud

  

  1. (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China)
  • Received:2019-07-10 Online:2020-04-22 Published:2020-04-24

Abstract: Public integrity auditing for shared data in the cloud is used to verify the integrity of data which are shared among group users in the cloud. Traditionally, group users need to generate the authenticator for each data block, and then upload shared data and the corresponding authenticators to the cloud server for storage. However, the users computing resources are limited and computing power is not enough, so it takes a lot of computing overhead for users to generate authenticators for data blocks. In order to save users computing resources and improve the efficiency of authenticator generation, a public integrity auditing scheme based on blind signature for shared data in the cloud is proposed. Users firstly blind the data blocks and then send them to the authenticator generation center to generate the corresponding authenticators. In addition, the Third Party Auditor (TPA) is authorized to audit in this scheme, which effectively avoids the DDoS attacks of the attacker on the cloud sever. The security analysis and experimental results show that the proposed scheme is safe and efficient.

Key words: cloud storage, shared data, data integrity auditing, blind signature, auditing authorization

CLC Number: