计算机科学
云计算
数据完整性
架空(工程)
云存储
外包
计算机安全
服务器
复制品
服务提供商
审计
加密
方案(数学)
数据库
计算机网络
服务(商务)
操作系统
数学分析
法学
管理
经济
视觉艺术
艺术
经济
数学
政治学
作者
Yilin Yuan,Fan Yang,Xiao Wang,Yimin Tian,Zichen Li
出处
期刊:PeerJ
[PeerJ, Inc.]
日期:2024-01-16
卷期号:10: e1790-e1790
被引量:1
标识
DOI:10.7717/peerj-cs.1790
摘要
Nowadays, more people are choosing to use cloud storage services to save space and reduce costs. To enhance the durability and persistence, users opt to store important data in the form of multiple copies on cloud servers. However, outsourcing data in the cloud means that it is not directly under the control of users, raising concerns about security and integrity. Recent research has found that most existing multicopy integrity verification schemes can correctly perform integrity verification even when multiple copies are stored on the same Cloud Service Provider (CSP), which clearly deviates from the initial intention of users wanting to store files on multiple CSPs. With these considerations in mind, this paper proposes a scheme for synchronizing the integrity verification of copies, specifically focusing on strongly privacy Internet of Things (IoT) electronic health record (EHR) data. First, the paper addresses the issues present in existing multicopy integrity verification schemes. The scheme incorporates the entity Cloud Service Manager (CSM) to assist in the model construction, and each replica file is accompanied with its corresponding homomorphic verification tag. To handle scenarios where replica files stored on multiple CSPs cannot provide audit proof on time due to objective reasons, the paper introduces a novel approach called probability audit. By incorporating a probability audit, the scheme ensures that replica files are indeed stored on different CSPs and guarantees the normal execution of the public auditing phase. The scheme utilizes identity-based encryption (IBE) for the detailed design, avoiding the additional overhead caused by dealing with complex certificate issues. The proposed scheme can withstand forgery attack, replace attack, and replay attack, demonstrating strong security. The performance analysis demonstrates the feasibility and effectiveness of the scheme.
科研通智能强力驱动
Strongly Powered by AbleSci AI