Secure protocol for identity-based provable data possession in cloud storage

Cheng Ta Hunag, Cheng Yu Yang, Chi Yao Weng, Yen Wen Chen, Shiuh Jeng Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Remote data possession is becoming an increasingly important issue in cloud storage. It enables users to verify if their outsourced data have remained intact while in cloud storage. The existing remote data audit (RDA) protocols were designed with the public key infrastructure (PKI) system. However, this incurs considerable costs when users need to frequently access data from the cloud service provider with PKI. This study proposes a protocol, called identity-based RDA (ID-RDA) that addresses this problem without the need for users’ certificates. This study outperforms existing RDA protocols in computation and communication.

Original languageEnglish
Title of host publication2019 IEEE 4th International Conference on Computer and Communication Systems, ICCCS 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages327-331
Number of pages5
ISBN (Electronic)9781728113227
DOIs
StatePublished - Feb 2019
Event4th IEEE International Conference on Computer and Communication Systems, ICCCS 2019 - Singapore, Singapore
Duration: 23 Feb 201925 Feb 2019

Publication series

Name2019 IEEE 4th International Conference on Computer and Communication Systems, ICCCS 2019

Conference

Conference4th IEEE International Conference on Computer and Communication Systems, ICCCS 2019
Country/TerritorySingapore
CitySingapore
Period23/02/1925/02/19

Keywords

  • Cloud security
  • Cryptography
  • Digital signature
  • Remote data audit

Fingerprint

Dive into the research topics of 'Secure protocol for identity-based provable data possession in cloud storage'. Together they form a unique fingerprint.

Cite this