JISE


  [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ]


Journal of Information Science and Engineering, Vol. 33 No. 4, pp. 923-938


An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City


JIAN SHEN1,2,3,4, DENGZHI LIU1,3, QI LIU1,3, DEBIAO HE5,* AND XINGMING SUN1,3
1Jiangsu Engineering Center of Network Monitoring
2Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology
3School of Computer and Software
Nanjing University of Information Science and Technology
Nanjing, 210044 P.R. China

4State Key Laboratory of Information Security, Institute of Information Engineering
Chinese Academy of Sciences
Beijing, 100864 P.R. China

5State Key Laboratory of Software Engineering, School of Computer
Wuhan University
Hubei, 430072 P.R. China
E-mail: {s_shenjian; liudzdh}@126.com; {qrankl; hedebiao; sunnudt}@163.com


Cloud-assisted applications have been developed in recent years, especially in servicing the smart city. Cloud computing is an emerging technology, which combines many redundant and distributed servers to provide various applications and services. On the one hand, the users can outsource their data to the cloud and enjoy the services that are provided by the cloud anytime and anywhere. On the other hand, outsourcing the data to the cloud will reduce the local storage burden and alleviate the hardware maintenance. However, the cloud server is semi-trusted, which possibly threaten the data’s security. In addition, because the data owner will not physically possess the data after outsourcing the data to the cloud, it is required to check the storage correctness and data integrity. Cloud auditing protocols are proposed to solve this problem, but the efficiency and security of previous protocols are not well. In this paper, we proposed an enhanced auditing protocol, which can reduce the verification cost greatly and offer enough security assurance. Besides, our protocol is able to resist the forgery attack in the proof verification. The security and performance analysis shows that the proposed protocol can efficiently
support storage verification and privacy preserving.


Keywords: cloud computing, security, cloud auditing protocol, storage verification, privacy preserving

  Retrieve PDF document (JISE_201704_04.pdf)