Wenyong Yuan, Ruifeng Li, Zhengge Yi, Pei Chen, H. Yang, Xiaoyuan Yang
{"title":"安全的云数据存储与选择审计","authors":"Wenyong Yuan, Ruifeng Li, Zhengge Yi, Pei Chen, H. Yang, Xiaoyuan Yang","doi":"10.1109/NaNA56854.2022.00034","DOIUrl":null,"url":null,"abstract":"Outsourcing data is out of the physical control of users, and its integrity verification is an important means to ensure data security. Reviewing of the problem that auditors are fixed in the existing public audit schemes, an integrity verification scheme in which users can choose auditors was proposeed, so that users can choose appropriate auditors according to their own actual situation and make reasonable use of resources. Furthermore, it can be extended to select double auditors for integrity verification. There is no interaction between the two auditors, which can improve the verification credibility. The safety analysis and efficiency analysis show that the scheme is safe and efficient.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Cloud Data Storage with Selecting Auditors\",\"authors\":\"Wenyong Yuan, Ruifeng Li, Zhengge Yi, Pei Chen, H. Yang, Xiaoyuan Yang\",\"doi\":\"10.1109/NaNA56854.2022.00034\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Outsourcing data is out of the physical control of users, and its integrity verification is an important means to ensure data security. Reviewing of the problem that auditors are fixed in the existing public audit schemes, an integrity verification scheme in which users can choose auditors was proposeed, so that users can choose appropriate auditors according to their own actual situation and make reasonable use of resources. Furthermore, it can be extended to select double auditors for integrity verification. There is no interaction between the two auditors, which can improve the verification credibility. The safety analysis and efficiency analysis show that the scheme is safe and efficient.\",\"PeriodicalId\":113743,\"journal\":{\"name\":\"2022 International Conference on Networking and Network Applications (NaNA)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Networking and Network Applications (NaNA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NaNA56854.2022.00034\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA56854.2022.00034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Outsourcing data is out of the physical control of users, and its integrity verification is an important means to ensure data security. Reviewing of the problem that auditors are fixed in the existing public audit schemes, an integrity verification scheme in which users can choose auditors was proposeed, so that users can choose appropriate auditors according to their own actual situation and make reasonable use of resources. Furthermore, it can be extended to select double auditors for integrity verification. There is no interaction between the two auditors, which can improve the verification credibility. The safety analysis and efficiency analysis show that the scheme is safe and efficient.