{"title":"基于身份的云计算公共审计协议","authors":"N. Garg, S. Bawa","doi":"10.1109/WIECON-ECE.2017.8468932","DOIUrl":null,"url":null,"abstract":"Today cloud computing has emerged as an esteemed Information Technology (IT) platform which offers variety of quality services to its users. Offering storage space is a pivotal cloud computing service where users can outsource their local data and get relieve from its maintenance burden. However, the loss of proprietorship on data creates the need of a mechanism for auditing integrity of outsourced data. Due to expertise and resource limitations, a Third Party Auditor (TPA) is required to perform an integrity audit on user’s sensitive data. Data Integrity Auditing (DIA) protocols proposed so far relies completely on Public Key Infrastructures (PKI). Management of certificates of public keys in PKI is a complex process. In the proposed work, the features of Identity Based Signatures (IBS) are combined with public verification of data to construct an efficient protocol for DIA in cloud storage. Security model for proposed ID-PAPC has been established in a ROM and relies on stability of Computational Diffie Hellman Problem (CDHP).","PeriodicalId":188031,"journal":{"name":"2017 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"ID-PAPC: Identity based Public Auditing Protocol for Cloud Computing\",\"authors\":\"N. Garg, S. Bawa\",\"doi\":\"10.1109/WIECON-ECE.2017.8468932\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today cloud computing has emerged as an esteemed Information Technology (IT) platform which offers variety of quality services to its users. Offering storage space is a pivotal cloud computing service where users can outsource their local data and get relieve from its maintenance burden. However, the loss of proprietorship on data creates the need of a mechanism for auditing integrity of outsourced data. Due to expertise and resource limitations, a Third Party Auditor (TPA) is required to perform an integrity audit on user’s sensitive data. Data Integrity Auditing (DIA) protocols proposed so far relies completely on Public Key Infrastructures (PKI). Management of certificates of public keys in PKI is a complex process. In the proposed work, the features of Identity Based Signatures (IBS) are combined with public verification of data to construct an efficient protocol for DIA in cloud storage. Security model for proposed ID-PAPC has been established in a ROM and relies on stability of Computational Diffie Hellman Problem (CDHP).\",\"PeriodicalId\":188031,\"journal\":{\"name\":\"2017 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WIECON-ECE.2017.8468932\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIECON-ECE.2017.8468932","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ID-PAPC: Identity based Public Auditing Protocol for Cloud Computing
Today cloud computing has emerged as an esteemed Information Technology (IT) platform which offers variety of quality services to its users. Offering storage space is a pivotal cloud computing service where users can outsource their local data and get relieve from its maintenance burden. However, the loss of proprietorship on data creates the need of a mechanism for auditing integrity of outsourced data. Due to expertise and resource limitations, a Third Party Auditor (TPA) is required to perform an integrity audit on user’s sensitive data. Data Integrity Auditing (DIA) protocols proposed so far relies completely on Public Key Infrastructures (PKI). Management of certificates of public keys in PKI is a complex process. In the proposed work, the features of Identity Based Signatures (IBS) are combined with public verification of data to construct an efficient protocol for DIA in cloud storage. Security model for proposed ID-PAPC has been established in a ROM and relies on stability of Computational Diffie Hellman Problem (CDHP).