期刊名称:International Journal of Early Childhood Special Education
电子版ISSN:1308-5581
出版年度:2022
卷号:14
期号:2
页码:6191-6194
DOI:10.9756/INT-JECSE/V14I2.708
语种:English
出版社:International Journal of Early Childhood Special Education
摘要:Private auditing and public auditing are the two most common types of traditional remote data possession auditing systems. Informally, only the original data owner can check the integrity of its outsourced data in private auditing, but everyone can do so in public auditing. Existing private and public auditing techniques do not satisfy the need for a single designated verifier in many real-world circumstances. Existing cloud auditing solutions rely on Public Key Infrastructure (PKI) and hence face certificate management and verification issues. In addition, these techniques require a lot of computing time to verify the integrity of data blocks. The damage caused by key disclosure in identity-based schemes is restricted to the time period immediately before the key's exposure, even though certificates are no longer required. Several of the most important exposure-resistant approaches don't support batch auditing. This study proposes an identity-based proof of data possession technique. With this feature, identity-based cloud storage auditing's security is protected in both pre- and post-exposure phases. Additionally, batch auditing is supported. Using this strategy, the Cloud Service Provider's replacement assault is thwarted, data privacy is protected against the Third-Party Auditor, and the correctness of the data is effectively verified.
关键词:Private auditing and public auditing are the two most common types of traditional remote data possession auditing systems