基于优化数据块大小的椭圆曲线双线性配对的远程存储数据安全认证

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING
Vidyullata Devmane, B. K. Lande
{"title":"基于优化数据块大小的椭圆曲线双线性配对的远程存储数据安全认证","authors":"Vidyullata Devmane,&nbsp;B. K. Lande","doi":"10.1002/cpe.70141","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>As cloud computing grows exponentially, businesses depend increasingly on distant servers to store enormous volumes of data. However, it is not easy to guarantee the confidentiality and integrity of data stored remotely. Unauthorized changes, whether intentional or unintentional, might jeopardize data accuracy, underscoring the pressing need for strong data authentication procedures. Currently, data is stored in the cloud to save money on storage. It is essential to check if any changes to the data were done intentionally or by mistake. This presents a key challenge: ensuring that remotely stored data remains intact and unmodified by users. Hence, in this system, it is proposed that the authenticity of data possession be verified and its integrity audited. Our proposed system for cloud data authentication aims to be audited by an authentic user/auditor to confirm any changes made in the original data once it is placed on remote storage. The proposed system considers essential factors such as response time, data storage space requirement and preservation of strong Security for the client's data. To achieve design and implementation, modern cryptosystems, such as Elliptical Curve Cryptography (ECC) with Bilinear Pairing (BP), possess a strong mathematical foundation. The homomorphism property of bilinear pairing is used as it allows performing operations on ciphertext to verify the integrity of uploaded data by the auditor without compromising confidentiality. Furthermore, optimization of data block size is introduced in our system, which encourages the practical use of asymmetric key cryptosystems for applications handling large volumes of data. Our ECC with Bilinear Pairing-based approach is also helpful for dynamic data verification in a cloud storage environment. Experimental results show that for a 1 MB file, encryption and decryption times using the suggested BPECC technique were approximately 24 min 51 s and 10 min 20 s, respectively, significantly outperforming RSA and Boneh-Goh-Nissim (BGN), which required up to 2 h 59 min for decryption. Moreover, storage overhead remains low due to efficient tag generation and block size optimization. Experimental results demonstrate that our system outperforms other homomorphic encryption schemes like BGN, RSA, ElGamal, and Paillier regarding encryption/decryption speed and storage overhead. This makes it a suitable solution for practical cloud storage applications.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 18-20","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Data Authentication for Remotely Stored Data Using Bilinear Pairing on Elliptic Curves With Optimized Data Block Size\",\"authors\":\"Vidyullata Devmane,&nbsp;B. K. Lande\",\"doi\":\"10.1002/cpe.70141\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>As cloud computing grows exponentially, businesses depend increasingly on distant servers to store enormous volumes of data. However, it is not easy to guarantee the confidentiality and integrity of data stored remotely. Unauthorized changes, whether intentional or unintentional, might jeopardize data accuracy, underscoring the pressing need for strong data authentication procedures. Currently, data is stored in the cloud to save money on storage. It is essential to check if any changes to the data were done intentionally or by mistake. This presents a key challenge: ensuring that remotely stored data remains intact and unmodified by users. Hence, in this system, it is proposed that the authenticity of data possession be verified and its integrity audited. Our proposed system for cloud data authentication aims to be audited by an authentic user/auditor to confirm any changes made in the original data once it is placed on remote storage. The proposed system considers essential factors such as response time, data storage space requirement and preservation of strong Security for the client's data. To achieve design and implementation, modern cryptosystems, such as Elliptical Curve Cryptography (ECC) with Bilinear Pairing (BP), possess a strong mathematical foundation. The homomorphism property of bilinear pairing is used as it allows performing operations on ciphertext to verify the integrity of uploaded data by the auditor without compromising confidentiality. Furthermore, optimization of data block size is introduced in our system, which encourages the practical use of asymmetric key cryptosystems for applications handling large volumes of data. Our ECC with Bilinear Pairing-based approach is also helpful for dynamic data verification in a cloud storage environment. Experimental results show that for a 1 MB file, encryption and decryption times using the suggested BPECC technique were approximately 24 min 51 s and 10 min 20 s, respectively, significantly outperforming RSA and Boneh-Goh-Nissim (BGN), which required up to 2 h 59 min for decryption. Moreover, storage overhead remains low due to efficient tag generation and block size optimization. Experimental results demonstrate that our system outperforms other homomorphic encryption schemes like BGN, RSA, ElGamal, and Paillier regarding encryption/decryption speed and storage overhead. This makes it a suitable solution for practical cloud storage applications.</p>\\n </div>\",\"PeriodicalId\":55214,\"journal\":{\"name\":\"Concurrency and Computation-Practice & Experience\",\"volume\":\"37 18-20\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2025-07-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Concurrency and Computation-Practice & Experience\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70141\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70141","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

摘要

随着云计算呈指数级增长,企业越来越依赖于远程服务器来存储海量数据。然而,要保证远程存储数据的机密性和完整性并不容易。未经授权的更改,无论是有意的还是无意的,都可能危及数据的准确性,从而强调了对强大的数据身份验证过程的迫切需要。目前,数据存储在云端是为了节省存储成本。检查对数据的任何更改是有意的还是错误的,这一点很重要。这就提出了一个关键的挑战:确保远程存储的数据保持完整且不被用户修改。因此,在本系统中,提出了对数据所有权的真实性进行验证,并对其完整性进行审计。我们提出的云数据认证系统旨在由真实的用户/审计员进行审计,以确认原始数据在远程存储后所做的任何更改。该系统考虑了响应时间、数据存储空间需求和客户端数据的强安全性等关键因素。为了实现设计和实现,现代密码系统,如椭圆曲线密码(ECC)与双线性配对(BP),具有强大的数学基础。利用双线性配对的同态特性,允许对密文进行操作,以验证审计者上传数据的完整性,而不损害机密性。此外,在我们的系统中引入了数据块大小的优化,这鼓励在处理大量数据的应用程序中实际使用非对称密钥密码系统。我们的基于双线性配对方法的ECC也有助于云存储环境中的动态数据验证。实验结果表明,对于1mb的文件,使用建议的BPECC技术进行加密和解密的时间分别约为24分51秒和10分20秒,显著优于RSA和Boneh-Goh-Nissim (BGN),后者需要长达2小时59分钟的解密时间。此外,由于有效的标签生成和块大小优化,存储开销仍然很低。实验结果表明,我们的系统在加密/解密速度和存储开销方面优于其他同态加密方案,如BGN、RSA、ElGamal和Paillier。这使得它成为实际云存储应用程序的合适解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Secure Data Authentication for Remotely Stored Data Using Bilinear Pairing on Elliptic Curves With Optimized Data Block Size

As cloud computing grows exponentially, businesses depend increasingly on distant servers to store enormous volumes of data. However, it is not easy to guarantee the confidentiality and integrity of data stored remotely. Unauthorized changes, whether intentional or unintentional, might jeopardize data accuracy, underscoring the pressing need for strong data authentication procedures. Currently, data is stored in the cloud to save money on storage. It is essential to check if any changes to the data were done intentionally or by mistake. This presents a key challenge: ensuring that remotely stored data remains intact and unmodified by users. Hence, in this system, it is proposed that the authenticity of data possession be verified and its integrity audited. Our proposed system for cloud data authentication aims to be audited by an authentic user/auditor to confirm any changes made in the original data once it is placed on remote storage. The proposed system considers essential factors such as response time, data storage space requirement and preservation of strong Security for the client's data. To achieve design and implementation, modern cryptosystems, such as Elliptical Curve Cryptography (ECC) with Bilinear Pairing (BP), possess a strong mathematical foundation. The homomorphism property of bilinear pairing is used as it allows performing operations on ciphertext to verify the integrity of uploaded data by the auditor without compromising confidentiality. Furthermore, optimization of data block size is introduced in our system, which encourages the practical use of asymmetric key cryptosystems for applications handling large volumes of data. Our ECC with Bilinear Pairing-based approach is also helpful for dynamic data verification in a cloud storage environment. Experimental results show that for a 1 MB file, encryption and decryption times using the suggested BPECC technique were approximately 24 min 51 s and 10 min 20 s, respectively, significantly outperforming RSA and Boneh-Goh-Nissim (BGN), which required up to 2 h 59 min for decryption. Moreover, storage overhead remains low due to efficient tag generation and block size optimization. Experimental results demonstrate that our system outperforms other homomorphic encryption schemes like BGN, RSA, ElGamal, and Paillier regarding encryption/decryption speed and storage overhead. This makes it a suitable solution for practical cloud storage applications.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Concurrency and Computation-Practice & Experience
Concurrency and Computation-Practice & Experience 工程技术-计算机:理论方法
CiteScore
5.00
自引率
10.00%
发文量
664
审稿时长
9.6 months
期刊介绍: Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of: Parallel and distributed computing; High-performance computing; Computational and data science; Artificial intelligence and machine learning; Big data applications, algorithms, and systems; Network science; Ontologies and semantics; Security and privacy; Cloud/edge/fog computing; Green computing; and Quantum computing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信