Citation: | Abdul Rehman, LIU Jian, Muhammad Qasim Yasin, LI Keqiu. Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation[J]. Chinese Journal of Electronics, 2021, 30(3): 489-499. doi: 10.1049/cje.2021.04.002 |
P. Mell and T. Grance, “Draft NIST working definition of cloud computing”, http://csrc.nist.gov/groups/SNC/cloudcomputing/index.html, Reference on June, 3rd, 2019.
|
G. Ateniese, R.C. Burns, R. Curtmola, et al., “Provable data possession at untrusted stores”, Proc. ACM Conf. of Computer and Communications Security, Alexandria, Virginia, USA, pp.598–609, 2007.
|
H. Shacham and B. Waters, “Compact proofs of irretrievability”, Proc. Of Cryptology-ASIACRYPT, LNCS, Vol.5350, pp.90–107, 2008.
|
J. Liu, K. Huang, H. Rong, et al., “Privacy-preserving public auditing for regenerating-code-based cloud storage”, IEEE Trans. on Information Forensics and Security, Vol.10, No.7, pp.1513–1528, 2015.
|
C. Wang, Q. Wang, K. Ren, et al., “Privacy-preserving public auditing for data storage security in cloud computing”, Proc. of IEEE INFOCOM, San Diego, CA, pp.525–533, 2010.
|
G. Ateniese, S. Kamara and J. Katz, “Proofs of storage from homomorphic identification protocols”, Proc. of ASIACRYPT 2009, pp.319–333, 2009
|
A. F. Barsoum and M. A. Hasan, “Provable multicopy dynamic data possession in cloud computing systems”, IEEE Trans. on Information Forensics and Security, Vol.10, No.3, pp.485–497, 2015
|
J. Yu, K. Ren, C. Wang, et al., “Enabling cloud storage auditing with key-exposure resistance”, IEEE Trans. on Information Forensics and Security, Vol.10, No.6, pp.1167–1179, 2015
|
Q. Wang, C. Wang, J. Li, et al., “Enabling public verifiability and data dynamics for storage security in cloud computing”, Proc. of ESORICS-2009, LNCS 5789, pp.355–370, 2009
|
C. Wang, K. Ren, W. Lou, et al., “Toward publicly auditable secure cloud data storage services”, IEEE Network, Vol.24, pp.19–24, 2010.
|
Q. Wang, C. Wang, K. Ren, et al., “Enabling public audibility and data dynamics for storage security in cloud computing”, IEEE Trans. Parallel Distrib. Syst., Vol.22, pp.847–859, 2011.
|
K. Yang and X. Jia. “An efficient and secure dynamic auditing protocol for data storage in cloud computing”, IEEE Trans. on Parallel and Distributed Systems, Vol.24, No.9, pp.1717–1726, 2013
|
Y. Zhu, H. Hu, G. J. Ahn, et al., “Efficient audit service outsourcing for data integrity in clouds”, Journal of Systems and Software, Vol.865, No.5, pp.1083–1095, 2012
|
J. Wang, X. Chen, X. Huang, et al., “Verifiable auditing for outsourced database in cloud computing”, IEEE Transactions on Computers, Vol.64, No.11, pp.3293–3303, 2015
|
C. Liu, R. Ranjan, C. Yang, et al., “MuRDPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud”, IEEE Trans. on Computers, Vol.64, No.9, pp.2609–2622, 2015
|
C. Wang, S. S. Chow, Q. Wang, et al., “Privacy-preserving public auditing for secure cloud storage”, IEEE Trans. on Computers, Vol.62, pp.362–375, 2013.
|
Zhang Jianhong and Dong Qiaocui, “Efficient ID-based public auditing for the outsourced data in cloud storage”, Information Sciences, Vol.343–344, pp.1–14, 2016
|
Huaqun Wang, “Identity-based distributed provable data possession in multicloud storage”, IEEE Trans. on Services Computing, Vol.8, No.2, pp.328–340,2015
|
E.J.Goh and S.Jarecki, “A signature scheme as secure as the diffie-hellman problem”, EUROCRYPT 2003, LNCS, Vol.2656, pp.401–415, 2003.
|
Huaqun Wang, Qianhong Wu, Bo Qin, et al., “Identity-based remote data possession checking in public clouds”, IET Information Security, Vol.8, No.2, pp.114–121, 2014.
|
J. Liu, R. Sun, W. Kou, et al., “Efficient ID-based signature without trusted PKG”, available at https://eprint.iacr.org/2007/135.pdf, 2007-4-18.
|
T. Zou, J. Wu and C. Wan, “An AAA based public auditable proof-of-storage scheme for cloud computing”, IEEE Conf. 12th ICCCT, pp.1226–1230, 2012.
|
Y. Yu, M.H. Au, G. Ateniese, et al., “Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage”, IEEE Trans. on Information Forensics and Security, DOI: 10.1109/TIFS.2016.2615853, 2016.
|
J. Zhang and H. Meng, “Comment on identity-based remote data integrity checking with perfect data privacy preserving”, IOP Conf. Series: Materials Science and Engineering, DOI:10.1088/1757-899X/231/1/012006, 2017.
|
F. Hess, “Efficient identity based signature schemes based on pairings”, Proc. SAC 2002, LNCS 2595, pp.310–324, 2003.
|
H. Wang, Q. Wu and B. Qin, “Identity-based remote data possession checking in public clouds”, IET Inf. Sec., Vol.8, No2, pp.114–121, 2014.
|
L. Jin, L. Jingwei, C. Xiaofeng, et al., “Identity-based encryption with outsourced revocation in cloud computing”, IEEE Trans. Computers, Vol.64, No.2, pp.425–437, 2015.
|
D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing”, LNCS, Springer-Verlag, pp.213–229, 2001.
|
B. Lynn, “The Pairing-Based Cryptography Library (0.5.13)”, available at http://crypto.stanford.edu/pbc/, 2013.
|
A. Kate, “The Pairing-Based Cryptography (PBC) Library - C++ Wrapper Classes (0.8.0)”, available at http://crysp.uwaterloo.ca/software/PBCWrapper/, 2015.
|
“java JPBC library”, available at http://gas.dia.unisa.it/ReferenceonJune.3rd,2019.projects/jpbc/, 2019.
|
A.D. Caro and V. Iovino, “jPBC: Java pairing based cryptography”, IEEE Symp. Computers and Communications (ISCC), Kerkyra, pp.850-855, 2011.
|